Powered by Deep Web Technologies
Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Broader source: Energy.gov (indexed) [DOE]

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

2

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

3

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

4

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

5

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

6

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

7

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

8

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

9

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

10

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

11

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers [EERE]

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

12

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

13

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

14

T-614: Cisco Unified Communications Manager Database Security...  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

15

EERE Project Management Center Database PIA, The Office of Energy...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EERE Project Management Center Database PIA, The Office of Energy Efficiency and Renewable Energy (EERE) EERE Project Management Center Database PIA, The Office of Energy...

16

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

17

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

18

The design and implementation of the buffer manager for an experimental relational database management system  

E-Print Network [OSTI]

Buffer management is an essential component of database management. This thesis presents a design and implementation of the buffer manager for an experimental relational database management system. The relationship and difference between database...

Li, Zaichun

2012-06-07T23:59:59.000Z

19

WORKLOAD ADAPTATION IN AUTONOMIC DATABASE MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

in Autonomic DBMSs", Proceedings of the 2nd International Workshop on Self-Managing Database Systems (SMDB 2007 to meet its Service Level Objectives (SLOs). It is a challenge to adapt multiple workloads with complex scheduler that performs workload adaptation in a DBMS, as the test bed to prove the effectiveness

20

CS 525: Advanced Database Organization Study of relational, semantic, and object-oriented data models and interfaces. Database management system  

E-Print Network [OSTI]

History of database management. Goals of database system development. Relational systems Data modelsCS 525: Advanced Database Organization Objectives Study of relational, semantic, and object-oriented data models and interfaces. Database management system techniques for query optimization, concurrency

Heller, Barbara

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Managing and Querying Transaction-time Databases under Schema Evolution  

E-Print Network [OSTI]

problem of managing the history of database in- formation is now made more urgent and complex by fast evolution history. 1. INTRODUCTION The ability of archiving past database information and supporting when it comes to preservation of the database history. Converting the old database to a new one after

Zaniolo, Carlo

22

Performance Modeling and Access Methods for Temporal Database Management Systems  

E-Print Network [OSTI]

implementation issues. Database systems with temporal support maintain history data on line together with current. Performance Modeling and Access Methods for Temporal Database Management Systems TR86-018 August. #12;Performance Modeling and Access Methods for Temporal Database Management Systems by Ilsoo Ahn

North Carolina at Chapel Hill, University of

23

NGNP Risk Management Database: A Model for Managing Risk  

SciTech Connect (OSTI)

To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

John Collins

2009-09-01T23:59:59.000Z

24

A Database Management System for the Federal Courts  

E-Print Network [OSTI]

A Database Management System for the Federal Courts JACK R. BUCHANAN, RICHARD D. FENNELL Federal Making Information Systems, Inc., McLean, VA 22101; R. D. Fennell, Federal Judicial Center, Washington, D and several large-scale information management systems projects have been undertaken within the Federal

Samet, Hanan

25

DOE technology information management system database study report  

SciTech Connect (OSTI)

To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.

1994-11-01T23:59:59.000Z

26

Databases  

K-12 Energy Lesson Plans and Activities Web site (EERE)

This page contains several databases that provide comprehensive information to expand your biomass knowledge. Use the descriptions and links provided to access the database that best meets your...

27

Development of Energy Consumption Database Management System of Existing Large Public Buildings  

E-Print Network [OSTI]

The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy...

Li, Y.; Zhang, J.; Sun, D.

2006-01-01T23:59:59.000Z

28

Database Requirements for Workflow Management in a HighThroughput Genome Laboratory 1  

E-Print Network [OSTI]

Database Requirements for Workflow Management in a High­Throughput Genome Laboratory 1 Anthony J and operationally efficient. A key component of this software is a database management system (DBMS) for controlling constitutes an audit trail, or event history, and has much the same function as a laboratory notebook

Bonner, Anthony

29

Building a disordered protein database: a case study in managing biological data  

Science Journals Connector (OSTI)

A huge diversity of biological databases is available via the Internet, but many of these databases have been developed in an ad hoc manner rather than in accordance with any data management principles. In addition, in the area of disordered protein ... Keywords: biological data management, disordered proteins

Arran D. Stewart; Xiuzhen Zhang

2007-03-01T23:59:59.000Z

30

CONCEPTUAL DATA MODELING OF THE INTEGRATED DATABASE FOR THE RADIOACTIVE WASTE MANAGEMENT  

SciTech Connect (OSTI)

A study of a database system that can manage radioactive waste collectively on a network has been carried out. A conceptual data modeling that is based on the theory of information engineering (IE), which is the first step of the whole database development, has been studied to manage effectively information and data related to radioactive waste. In order to establish the scope of the database, user requirements and system configuration for radioactive waste management were analyzed. The major information extracted from user requirements are solid waste, liquid waste, gaseous waste, and waste related to spent fuel. The radioactive waste management system is planning to share information with associated companies.

Park, H.S; Shon, J.S; Kim, K.J; Park, J.H; Hong, K.P; Park, S.H

2003-02-27T23:59:59.000Z

31

Microsoft PowerPoint - G4-Knowledge Management Database (KMD) Demonstration[1].ppt  

Broader source: Energy.gov (indexed) [DOE]

Knowledge Management Database Knowledge Management Database (KMD) Demonstration Rand Batchelder, Chris Wyatt, Dale Cunningham September 15 & 16, 2009 2 2 KMD Demonstration Overview * The Federal Advisory Committee Recommended That ORD Develop A Knowledge Management Database That Would Be Used As A Repository for Research and Development Results Related to the Section 999 R&D Program Including: - Program Status * A list of projects goals, objectives, status, accomplishments, reports and key personnel contact information - The RPSEA Consortium R&D Program * 57 project summaries currently available on the NETL Internet - NETL Complimentary R&D Program * Drilling under extreme conditions * Environmental impacts of oil and natural gas development * Enhanced and unconventional oil recovery

32

Managing MEDLINE: A Comparison of a Native XML Database System with a Relational Database System  

E-Print Network [OSTI]

. The DTD (Document Type Definition) defines the integral structure of the XML document. It describes querying the database online, and in an effort to control load on the servers, NLM limits the number offers researchers to overcome the limitations of the query options offered by NLM's web interface

Madiraju, Praveen

33

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

34

Generic Natural Systems Evaluation - Thermodynamic Database Development and Data Management  

SciTech Connect (OSTI)

Thermodynamic data are essential for understanding and evaluating geochemical processes, as by speciation-solubility calculations, reaction-path modeling, or reactive transport simulation. These data are required to evaluate both equilibrium states and the kinetic approach to such states (via the affinity term or its equivalent in commonly used rate laws). These types of calculations and the data needed to carry them out are a central feature of geochemistry in many applications, including water-rock interactions in natural systems at low and high temperatures. Such calculations are also made in engineering studies, for example studies of interactions involving man-made materials such as metal alloys and concrete. They are used in a fairly broad spectrum of repository studies where interactions take place among water, rock, and man-made materials (e.g., usage on YMP and WIPP). Waste form degradation, engineered barrier system performance, and near-field and far-field transport typically incorporate some level of thermodynamic modeling, requiring the relevant supporting data. Typical applications of thermodynamic modeling involve calculations of aqueous speciation (which is of great importance in the case of most radionuclides), solubilities of minerals and related solids, solubilities of gases, and stability relations among the various possible phases that might be present in a chemical system at a given temperature and pressure. If a phase can have a variable chemical composition, then a common calculational task is to determine that composition. Thermodynamic modeling also encompasses ion exchange and surface complexation processes. Any and all of these processes may be important in a geochemical process or reactive transport calculation. Such calculations are generally carried out using computer codes. For geochemical modeling calculations, codes such as EQ3/6 and PHREEQC, are commonly used. These codes typically provide 'full service' geochemistry, meaning that they use a large body of thermodynamic data, generally from a supporting database file, to sort out the various important reactions from a wide spectrum of possibilities, given specified inputs. Usually codes of this kind are used to construct models of initial aqueous solutions that represent initial conditions for some process, although sometimes these calculations also represent a desired end point. Such a calculation might be used to determine the major chemical species of a dissolved component, the solubility of a mineral or mineral-like solid, or to quantify deviation from equilibrium in the form of saturation indices. Reactive transport codes such as TOUGHREACT and NUFT generally require the user to determine which chemical species and reactions are important, and to provide the requisite set of information including thermodynamic data in an input file. Usually this information is abstracted from the output of a geochemical modeling code and its supporting thermodynamic data file. The Yucca Mountain Project (YMP) developed two qualified thermodynamic databases to model geochemical processes, including ones involving repository components such as spent fuel. The first of the two (BSC, 2007a) was for systems containing dilute aqueous solutions only, the other (BSC, 2007b) for systems involving concentrated aqueous solutions and incorporating a model for such based on Pitzer's (1991) equations. A 25 C-only database with similarities to the latter was also developed for the Waste Isolation Pilot Plant (WIPP, cf. Xiong, 2005). The NAGRA/PSI database (Hummel et al., 2002) was developed to support repository studies in Europe. The YMP databases are often used in non-repository studies, including studies of geothermal systems (e.g., Wolery and Carroll, 2010) and CO2 sequestration (e.g., Aines et al., 2011).

Wolery, T W; Sutton, M

2011-09-19T23:59:59.000Z

35

Risk analysis for local management from hydro-geomorphologic disaster databases  

Science Journals Connector (OSTI)

Abstract This article describes the applications of a hydro-geomorphologic disaster database allowing a more appropriate local risk management. Two databases of loss and damage with different criteria, using Central Portugal occurrences, were constructed upon national and regional newspapers: one included all the disaster occurrences regardless of the level of loss and damage reported and the other only the major disasters for which casualties and other human losses were reported. Risk matrices, exploring likelihood and consequence, were analysed along with data regarding urban and demographic dynamics over time and risk profiles by municipality were obtained. The results show that the database which only included major disasters produced a risk matrix with lower levels of risk in comparison to the one produced from the more inclusive database. The most densely urbanised municipalities represent a greater number of disaster occurrences, but when considering only major losses, other peripheral municipalities emerge as high risk. Changes in territorial forcers are shaping the impact patterns in the region. Along with an increase in the housing density, an increase in disasters is observed, although the decrease of inhabitants. Impacts and territorial forcers cluster analysis and risk matrices’ results conduced to municipal risk profiles supporting management. Those profiles conduce to different frames of action from specific emergency planning, warning and alert, multi-hazard planning, or prevention measures involving land use planning or insurance and mutualisation solutions. Disaster databases that allow differentiating local patterns of impacts–and their respective contexts - contribute to define locally adequate risk management policies.

Pedro Pinto dos Santos; Alexandre Oliveira Tavares; José Luís Zęzere

2014-01-01T23:59:59.000Z

36

Uncertainty Management for Spatial Data in Databases: Fuzzy Spatial Data Types  

E-Print Network [OSTI]

Uncertainty Management for Spatial Data in Databases: Fuzzy Spatial Data Types Markus Schneider an abstract, conceptual model of so­called fuzzy spatial data types (i.e., a fuzzy spatial algebra types called spatial data types (see [Sch97] for a survey) have been designed for modeling these spatial

GĂĽting, Ralf Hartmut

37

Elephant Beer and Shinto Gates: Managing Similar Concepts in a Multilingual Database  

E-Print Network [OSTI]

Elephant Beer and Shinto Gates: Managing Similar Concepts in a Multilingual Database Martin" and "tembo" are completely interchangeable when talking about elephants, but bring you different brands as "rouge" in French or "nyekundu" in Swahili. An "elephant" is an elephant, whether it is "éléphant

38

Two-Factor Authentication  

Broader source: Energy.gov [DOE]

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

39

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy  

DOE Patents [OSTI]

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

2000-01-01T23:59:59.000Z

40

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Web data stores (aka NoSQL databases): a data model and data management perspective  

Science Journals Connector (OSTI)

During the past decade, several Web companies have developed what I would call 'Web data stores' to support the performance, scalability and availability requirements of their interactive Web services. Google's Bigtable and Amazon's Dynamo in particular have energised a community of developers to develop similar systems as open source. These systems have come to be known as 'NoSQL database' systems. In this paper, I will examine these systems from the data model and data management perspective which has not been given enough attention. This is to shed further light on understanding the nature of these systems and their future directions.

Won Kim

2014-01-01T23:59:59.000Z

42

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

43

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

44

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

45

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

46

E-Print Network 3.0 - authenticated key agreement Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

47

Authentication of quantum messages.  

SciTech Connect (OSTI)

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

48

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

49

Load balancing and data-management strategies in a multitenant database cluster  

Science Journals Connector (OSTI)

A multitenant database cluster is a data-storage subsystem for applications with multiclient architecture. Essentially, it may be regarded as an additional level of abstraction beyond the set of regular server...

E. A. Boitsov

2014-09-01T23:59:59.000Z

50

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

51

CERTIFICATE OF AUTHENTICITY  

Broader source: Energy.gov (indexed) [DOE]

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

52

A multimedia database supporting a generic computer based quality management system  

E-Print Network [OSTI]

. However, some projects in developing local, or internal "web application" ("Intranets") have already technology. Database characteristics and problems involved with this novel kind of application development to be developed [4,5,6,34,35,36]. These services should support internal characteristics of the organizations

da Silva, Alberto Rodrigues

53

Design, implementation, and benchmarking of a file manager for a relational database management system on a raw UNIX disk  

E-Print Network [OSTI]

together through the entire journey. Thanks to the Computer Science Dept. , Texas AErM University, for lending me a SPARC workstation to design Modstar. Jonathan Creighton, Oracle Corp. , and Pyung-Chul Kim of ETRI, Korea, were always helpful... relational operations with different storage organizations (index on key, index on non-key, no index, clustered, and non-clustered relations) on a test database created using Modstar. The design has been implemented on a SPARC workstation running SUN OS 4...

Narayanan, Pudugramam Shanker

1994-01-01T23:59:59.000Z

54

The role of biodiversity databases in coastal conservation and resource management .  

E-Print Network [OSTI]

??Marine environmental resource managers and consultants require comprehensive, accurate and current data on the status of marine biodiversity in order to fully evaluate resource consent… (more)

Palacio, Monalisa

2009-01-01T23:59:59.000Z

55

COMPILATION AND MANAGEMENT OF ORP GLASS FORMULATION DATABASE, VSL-12R2470-1 REV 0  

SciTech Connect (OSTI)

The present report describes the first steps in the development of a glass property-composition database for WTP LAW and HL W glasses that includes all of the data that were used in the development of the WTP baseline models and all of the data collected subsequently as part of WTP enhancement studies perfonned for ORP. The data were reviewed to identifY some of the more significant gaps in the composition space that will need to be filled to support waste processing at Hanford. The WTP baseline models have been evaluated against the new data in terms of range of validity and prediction perfonnance.

Kruger, Albert A. [Department of Energy, Office of River Protection, Richland, Washington (United States); Pasieka, Holly K. [The Catholic University of America, Washington, DC (United States); Muller, Isabelle [The Catholic University of America, Washington, DC (United States); Gilbo, Konstantin [The Catholic University of America, Washington, DC (United States); Perez-Cardenas, Fernando [The Catholic University of America, Washington, DC (United States); Joseph, Innocent [The Catholic University of America, Washington, DC (United States); Pegg, Ian L. [The Catholic University of America, Washington, DC (United States); Kot, Wing K. [The Catholic University of America, Washington, DC (United States)

2012-12-13T23:59:59.000Z

56

Applications of interest : a relational database approach to managing control system software applications.  

SciTech Connect (OSTI)

Large accelerator facilities such as the Advanced Photon Source (APS) typically are operated by a diverse set of integrated control systems, such as front-end controllers, PLCs, and FPGAs. This type of control system structure encompasses numerous engineering documents, distributed real-time control system databases, source code, user displays, and other components. The complexity of the control system is further increased as the life cycle of a control system is never ending, change is constant. And the accelerator itself generates new operational problems on a regular basis. This overall controls environment begs the question of how best to provide a means for control system engineers to easily and quickly troubleshoot unique functions of the control system, find relevant information, and understand the impact of changes to one part of the control system on other applications. The answer to this question lies in being able to associate pertinent drawings, manuals, source code, hardware, and expert developers in an efficient and logical manner. Applications of Interest is a relational database software tool created for the purpose of providing alternative views of the supporting information behind each distinct control system application at the APS.

Quock, D. B.; Arnold, N.; Dohan, D.; Anderson, J.; Clemons, D. (APS Engineering Support Division)

2008-04-14T23:59:59.000Z

57

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

58

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

59

REDD+ Database | Open Energy Information  

Open Energy Info (EERE)

REDD+ Database REDD+ Database Jump to: navigation, search Tool Summary Name: REDD+ Database Agency/Company /Organization: Institute for Global Environmental Strategies Sector: Land Focus Area: Forestry Topics: Co-benefits assessment, Implementation, Background analysis Resource Type: Dataset Website: redd-database.iges.or.jp/redd/ REDD+ Database Screenshot References: REDD+ Database[1] Overview "The purpose of this database is to make information on REDD+ preparedness activities and projects available in a succinct manner to forest stakeholders and other interested groups, with the objective of supporting efforts to achieve climate change mitigation, resource conservation and positive development outcomes through sustainable forest management." References ↑ "REDD+ Database"

60

Database Help  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Database Help Database Help LANL researchers can access most subscription databases from offsite via Remote Access. Question? 667-5809 Email How do I get full text? Some databases...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

62

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

63

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

64

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

65

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

66

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

67

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

68

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

69

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers [EERE]

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

70

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

71

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

72

Information Solutions: Database Applications  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Database Applications Database Applications Argonne DOE-BES Central User Facility: A-Z People Query Data Warehouse Edits Registration | Registration Processing Security Admin Beamline Component Database System to manage beamline components. Beamline Downtime Report - UES Floor coordinator's downtime entry and reporting system. Beamline Directory | Beamline Entry Administration Links to the beamline websites and to detailed information about the equipment, techniques and contact information of a beamline. Beamline Usage and Scheduling System Long term schedule query and edit. Beamline schedule query and edit. Watchman and PSS data. Budget Proposal System Allows user to submit budget proposals via the web. Beamline Statistics Menu Query, entry and reporting of beamline statistics for ALD use only.

73

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

74

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

75

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

76

Efficient Versioning for Scientific Array Databases  

E-Print Network [OSTI]

In this paper, we describe a versioned database storage manager we are developing for the SciDB scientific database. The system is designed to efficiently store and retrieve array-oriented data, exposing a "no-overwrite" ...

Seering, Adam

77

Buildings Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Efficiency & Renewable Energy EERE Home | Programs & Offices | Consumer Information Buildings Database Welcome Guest Log In | Register | Contact Us Home About All Projects...

78

Database Search  

National Nuclear Security Administration (NNSA)

mountain ranges, faults that have both normal and strike slip. Dip Database Search http:gldims.cr.usgs.govwebappscfusionsitesqfaultqfwebdisp.cfm?... 1 of 1 3292010 6:23...

79

Database Search  

National Nuclear Security Administration (NNSA)

strike slip. Database Search http:gldims.cr.usgs.govwebappscfusionsitesqfaultqfwebdisp.cfm?... 1 of 3 3292010 5:50 PM Dip Comments: Probably steep to moderate, typical...

80

Database Search  

National Nuclear Security Administration (NNSA)

fault were found, so its displacement sense is uncertain. Dip Database Search http:gldims.cr.usgs.govwebappscfusionSitesqfaultqfwebdisp.cfm?... 1 of 1 1292010 2:54...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

82

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

83

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

84

Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more  

Science Journals Connector (OSTI)

The rapidly increasing volume of information contained in relational databases places a strain on databases, performance, and maintainability: DBAs are under greater pressure than ever to optimize database structure for system performance and administration. ... Keywords: Data Modeling & Design, Data Warehousing, Database Management, Information Technology

Sam S. Lightstone; Toby J. Teorey; Tom Nadeau

2007-03-01T23:59:59.000Z

85

Database Caching Over the Air-Storage  

Science Journals Connector (OSTI)

......adopted in database management systems for maximizing...utilizing an on-demand point-to-point...local database management system, and various...cache at the client side. In this model...cs over the on-demand channel and drive...challenges in data management. Commun. ACM......

H. Va Leong; A. Si

1997-01-01T23:59:59.000Z

86

E-Print Network 3.0 - archeological gold authentication Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

87

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

88

Database Search  

National Nuclear Security Administration (NNSA)

1:24,000. Database Search http:gldims.cr.usgs.govwebappscfusionSitesqfaultqfwebdisp.cfm?... 2 of 3 212010 12:30 PM 289 Dohrenwend, J.C., Schell, B.A., McKittrick,...

89

Scatter – secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

90

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

91

Official Knowledge: Validation Mechanisms for Knowledge Management Systems.  

E-Print Network [OSTI]

??One of the most important roles of a knowledge management system is as a filter to verify, authenticate, or justify the knowledge of an organization.… (more)

Watkins, Jennifer H

2009-01-01T23:59:59.000Z

92

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

93

Task 1.13 - Data Collection and Database Development for Clean Coal Technology By-Product Characteristics and Management Practices  

SciTech Connect (OSTI)

U.S. Department of Energy Federal Energy Technology Center-Morgantown (DOE FETC) efforts in the areas of fossil fuels and clean coal technology (CCT) have included involvement with both conventional and advanced process coal conversion by-products. In 1993, DOE submitted a Report to Congress on "Barriers to the Increased Utilization of Coal Combustion Desulfurization Byproducts by Governmental and Commercial Sectors" that provided an outline of activities to remove the barriers identified in the report. DOE charged itself with participation in this process, and the work proposed in this document facilitates DOE's response to its own recommendations for action. The work reflects DOE's commitment to the coal combustion by-product (CCB) industry, to the advancement of clean coal technology, and to cooperation with other government agencies. Information from DOE projects and commercial endeavors in fluidized-bed combustion (FBC) and coal gasification is the focus of this task. The primary goal is to provide an easily accessible compilation of characterization information on the by-products from these processes to government agencies and industry to facilitate sound regulatory and management decisions. Additional written documentation will facilitate the preparation of an updated final version of background information collected for DOE in preparation of the Report to Congress on barriers to CCB utilization.

Debra F. Pflughoeft-Hassett

1998-02-01T23:59:59.000Z

94

T-646: Debian fex authentication bypass | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

95

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

96

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

97

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

98

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network [OSTI]

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

99

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

100

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

102

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

103

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

104

Groundwater Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Groundwater Database Groundwater Database Groundwater Database DOE has one of the largest ground water contamination problems and subsequent cleanup responsibilities for a single entity in the world, in terms of the sheer volume of affected groundwater, number of plumes, range of hydrogeologic settings, and diversity of contaminant types. The Groundwater Database was developed to provide a centralized location for information relating to groundwater flow, contamination, and remedial approaches across the DOE complex. The database provides DOE management and other interested parties with an easily accessible, high level understanding of the type of contamination, magnitude of contamination, and dynamics of groundwater systems at DOE sites. It also identifies remedial approaches, exit strategies, long-term stewardship requirements, regulatory

105

The CEBAF Element Database  

SciTech Connect (OSTI)

With the inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting control computers to building controls screens. A requirement influencing the CED design is that it provide access to not only present, but also future and past configurations of the accelerator. To accomplish this, an introspective database schema was designed that allows new elements, types, and properties to be defined on-the-fly with no changes to table structure. Used in conjunction with Oracle Workspace Manager, it allows users to query data from any time in the database history with the same tools used to query the present configuration. Users can also check-out workspaces to use as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented Application Programming Interface (API) that is translated automatically from original C++ source code into native libraries for scripting languages such as perl, php, and TCL making access to the CED easy and ubiquitous.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-03-01T23:59:59.000Z

106

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

107

Gasification Plant Databases  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gasification Plant Databases News Gasifipedia Gasifier Optimization Feed Systems Syngas Processing Systems Analyses Gasification Plant Databases International Activity Program Plan...

108

Optimizing Database Load and Extract for Big Data Era  

Science Journals Connector (OSTI)

With growing and pervasive interest in Big Data, SQL relational databases need to compete with data management by Hadoop, NoSQL and NoDB. ... by query processing. But SQL databases require data in-place before qu...

K. T. Sridhar; M. A. Sakkeer

2014-01-01T23:59:59.000Z

109

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

110

Nuclear Concrete Materials Database Phase I Development  

SciTech Connect (OSTI)

The FY 2011 accomplishments in Phase I development of the Nuclear Concrete Materials Database to support the Light Water Reactor Sustainability Program are summarized. The database has been developed using the ORNL materials database infrastructure established for the Gen IV Materials Handbook to achieve cost reduction and development efficiency. In this Phase I development, the database has been successfully designed and constructed to manage documents in the Portable Document Format generated from the Structural Materials Handbook that contains nuclear concrete materials data and related information. The completion of the Phase I database has established a solid foundation for Phase II development, in which a digital database will be designed and constructed to manage nuclear concrete materials data in various digitized formats to facilitate electronic and mathematical processing for analysis, modeling, and design applications.

Ren, Weiju [ORNL; Naus, Dan J [ORNL

2012-05-01T23:59:59.000Z

111

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

112

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

113

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

114

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

115

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Broader source: Energy.gov (indexed) [DOE]

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

116

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

117

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

118

Integrating XML and Relational Database Systems  

Science Journals Connector (OSTI)

Relational databases get more and more employed in order to store the content of a web site. At the same time, XML is fast emerging as the dominant standard at the hypertext level of web site management descri...

Gerti Kappel; Elisabeth Kapsammer; Werner Retschitzegger

2004-12-01T23:59:59.000Z

119

VideoSTAR (Video STorage And Retrieval) is an experimental database frame-work for video information management. The development of this framework  

E-Print Network [OSTI]

ABSTRACT VideoSTAR (Video STorage And Retrieval) is an experimental database frame- work for video of traditional video tape archives are facing and by the multimedia technology that makes integrated, digital video archives feasible. Speci cally, VideoSTAR addresses issues related to sharing of video information

120

Databases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Technical Assistance Combined Heat & Power Deployment Databases Databases DOE has supported the development of several combined heat and power (CHP) and distributed energy...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

122

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

123

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

124

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joăo Pedro Sousa

2008-05-01T23:59:59.000Z

125

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

126

Databases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Databases Databases Databases November 1, 2013 - 11:40am Addthis DOE has supported the development of several combined heat and power (CHP) and distributed energy (DE) databases that have proven to be "go-to" resources for end users. These resources include an installation database that tracks CHP projects in all end-use sectors for all 50 states, as well as a database of regulatory requirements for small electric generators. A searchable database of CHP project profiles compiled by the DOE Regional Clean Energy Application Centers (CEACs) is also available. CHP Project Profiles Database (launched Feb. 2011 and continuously updated) CHP State and Regional Installation Database, May 2010 Database of State Incentives for Renewables and Efficiency (DSIRE) - CHP

127

Lessons Learned From Developing Reactor Pressure Vessel Steel Embrittlement Database  

SciTech Connect (OSTI)

Materials behaviors caused by neutron irradiation under fission and/or fusion environments can be little understood without practical examination. Easily accessible material information system with large material database using effective computers is necessary for design of nuclear materials and analyses or simulations of the phenomena. The developed Embrittlement Data Base (EDB) at ORNL is this comprehensive collection of data. EDB database contains power reactor pressure vessel surveillance data, the material test reactor data, foreign reactor data (through bilateral agreements authorized by NRC), and the fracture toughness data. The lessons learned from building EDB program and the associated database management activity regarding Material Database Design Methodology, Architecture and the Embedded QA Protocol are described in this report. The development of IAEA International Database on Reactor Pressure Vessel Materials (IDRPVM) and the comparison of EDB database and IAEA IDRPVM database are provided in the report. The recommended database QA protocol and database infrastructure are also stated in the report.

Wang, Jy-An John [ORNL

2010-08-01T23:59:59.000Z

128

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network [OSTI]

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

129

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

130

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

131

Gasification Plant Databases  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

coal gasification projects throughout the world. These databases track proposed gasification projects with approximate outputs greater than 100 megawatts electricity...

132

Buildings Performance Database Overview  

Broader source: Energy.gov [DOE]

Buildings Performance Database Overview, from the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy.

133

Hazard Analysis Database report  

SciTech Connect (OSTI)

This document describes and defines the Hazard Analysis Database for the Tank Waste Remediation System Final Safety Analysis Report.

Niemi, B.J.

1997-08-12T23:59:59.000Z

134

databases | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The database is available in Microsoft Access 2002 format. Download 6.35 MB COA Database Heavy Oil Database: 2004. The Heavy Oil Database contains information on over 500...

135

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

136

2010 Worldwide Gasification Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

137

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network [OSTI]

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

138

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

139

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

140

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

142

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network [OSTI]

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

143

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

144

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

145

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

146

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

147

database | OpenEI  

Open Energy Info (EERE)

database database Dataset Summary Description The Southern Methodist University (SMU) Geothermal Laboratory's database consists of primarily regional or background wells that determine the heat flow for the United States; temperature gradients and conductivity are used to generate heat flow measurements; some wells close together have been averaged; wells within geothermal anomalies are located, but not utilized in the regional analysis.Database includes: latitude/longitude, township/range, AMS sheet, well depth, elevation, max./min. temp, BHT, gradient(s), thermal conductivity, Source SMU Date Released Unknown Date Updated Unknown Keywords Alabama database geothermal SMU Data application/vnd.ms-excel icon Alabama geothermal data 2008 (xls, 19.5 KiB) Quality Metrics

148

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

149

CSP Techniques for Solving Combinatorial Queries within Relational Databases  

Science Journals Connector (OSTI)

A combinatorial query is a request for tuples from multiple relations that satisfy a conjunction of constraints on tuple attribute values. Managing combinatorial queries using the traditional database systems is ...

Malek Mouhoub; Chang Feng

2009-01-01T23:59:59.000Z

150

The Lowell Database Research Self Assessment By Authors *  

E-Print Network [OSTI]

correlations; information privacy; and self-adaptation and repair. 2 Introduction Some database researchers. In addition, they need help with managing the pipeline of data products produced by data analysis, storing

Abiteboul, Serge

151

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

152

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

153

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

154

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

155

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network [OSTI]

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

156

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

157

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

158

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

159

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network [OSTI]

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

160

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Records Management Vice-Chancellor's Directive 1 Records Management Vice-Chancellor's Directive  

E-Print Network [OSTI]

. Version control and change history Appendix 1. UTS Archives Collection Guidelines Appendix 2. Lifecycle Management Program (see section 5.2.4). Records database refers to the enterprise-wide records management database administered by University Records. The current records database is TRIM. #12;Records Management

University of Technology, Sydney

162

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

163

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

164

PATENTS OFFICE REGISTER DATABASE SEARCH  

E-Print Network [OSTI]

PATENTS OFFICE REGISTER & DATABASE SEARCH . Database Home PATENT REGISTER Status: Lapsed Grant No VERMEER MANUFACTURING COMPANY 2411 Highway 102 Pella, IA 50219 UNITED STATES OF AMERICA Address

Kansas, University of

165

Nuclear Science References Database  

E-Print Network [OSTI]

The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

B. Pritychenko; E. B?ták; B. Singh; J. Totans

2014-07-08T23:59:59.000Z

166

Databases | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

databases to make it easier for users to find up-to-date information on hydrogen and fuel cells. The Hydrogen and Fuel Cells Codes and Standards Matrix is an up-to-date...

167

Querying genomic databases  

SciTech Connect (OSTI)

A natural-language interface has been developed that retrieves genomic information by using a simple subset of English. The interface spares the biologist from the task of learning database-specific query languages and computer programming. Currently, the interface deals with the E. coli genome. It can, however, be readily extended and shows promise as a means of easy access to other sequenced genomic databases as well.

Baehr, A.; Hagstrom, R.; Joerg, D.; Overbeek, R.

1991-09-01T23:59:59.000Z

168

Crude Oil Analysis Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The composition and physical properties of crude oil vary widely from one reservoir to another within an oil field, as well as from one field or region to another. Although all oils consist of hydrocarbons and their derivatives, the proportions of various types of compounds differ greatly. This makes some oils more suitable than others for specific refining processes and uses. To take advantage of this diversity, one needs access to information in a large database of crude oil analyses. The Crude Oil Analysis Database (COADB) currently satisfies this need by offering 9,056 crude oil analyses. Of these, 8,500 are United States domestic oils. The database contains results of analysis of the general properties and chemical composition, as well as the field, formation, and geographic location of the crude oil sample. [Taken from the Introduction to COAMDATA_DESC.pdf, part of the zipped software and database file at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the zipped file to your PC. When opened, it will contain PDF documents and a large Excel spreadsheet. It will also contain the database in Microsoft Access 2002.

Shay, Johanna Y.

169

Integrated storage and querying of spatially varying data quality information in a relational spatial database  

E-Print Network [OSTI]

Integrated storage and querying of spatially varying data quality information in a relational Variation in Quality Keywords Spatial data quality; spatial database; relational database management system for storing and retrieving spatially varying data quality information in a relational spatial database. Rather

Duckham, Matt

170

Recreation Information Database - RIDB | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Recreation Information Database - RIDB Recreation Information Database - RIDB Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov » Communities » Agriculture » Data Recreation Information Database - RIDB Dataset Summary Description XML extractable listing of US Gov't Recreation sites Tags {recreation,camping,hiking,"visitor center","forest service","us army corps of engineers","national park service","bureau of reclamation","bureau of land management","fish and wildlife"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated Jun-09 Publisher US Forest Service, Department of Agriculture

171

Telecommunications Issues of Intelligent Database Management  

E-Print Network [OSTI]

in the EOS Era Joseph D. Touch Abstract ­ Future NASA Earth science missions, including the Earth Observing-gathering missions. Among the celestial bodies studied is the Earth. Current and future Earth science missions

Touch, Joe

172

Senbazuru: A Prototype Spreadsheet Database Management System  

E-Print Network [OSTI]

component is composed of a background extraction pipeline that automatically obtains relational data from spreadsheets, and a repair interface that allows users to manually repair extraction errors. ďż˝ Tuple Builder on a probabilistic model. Before Repair: ''White, total'' After Repair: ''White, total'' Framework Repair

Michigan, University of

173

Location management and Moving Objects Databases  

E-Print Network [OSTI]

wolfson@cs.uic.edu #12;2 Location based services Examples: Where closest gas station? How do I get there;13 Applications-- Summary · Geographic resource discovery-- e.g. "Closest gas station" · Digital Battlefield/trigger examples: · During the past year, how many times was bus#5 late by more than 10 minutes at station 20

Wolfson, Ouri E.

174

An Object Oriented Framework For Database Benchmarking Based On The Open Source Database  

E-Print Network [OSTI]

the throughput of DBMSs against each other on the same operating systems, and compare the same DBMS's throughput on different operating systems. A benchmark is one scientific way to achieve such results. The Open Source Benchmark (OSDB) project for the Oracle database management system. Second, we have developed

Wagner, Paul J.

175

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

176

Solid waste projection model: Database version 1. 0 technical reference manual  

SciTech Connect (OSTI)

The Solid Waste Projection Model (SWPM) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC). The SWPM system provides a modeling and analysis environment that supports decisions in the process of evaluating various solid waste management alternatives. This document, one of a series describing the SWPM system, contains detailed information regarding the software and data structures utilized in developing the SWPM Version 1.0 Database. This document is intended for use by experienced database specialists and supports database maintenance, utility development, and database enhancement. Those interested in using the SWPM database should refer to the SWPM Database User's Guide. 14 figs., 6 tabs.

Carr, F.; Bowman, A.

1990-11-01T23:59:59.000Z

177

Methods | Transparent Cost Database  

Open Energy Info (EERE)

Methods Methods Disclaimer The data gathered here are for informational purposes only. Inclusion of a report in the database does not represent approval of the estimates by DOE or NREL. Levelized cost calculations DO NOT represent real world market conditions. The calculation uses a single discount rate in order to compare technology costs only. About the Cost Database For emerging energy technologies, a variety of cost and performance numbers are cited in presentations and reports for present-day characteristics and potential improvements. Amid a variety of sources and methods for these data, the Office of Energy Efficiency and Renewable Energy's technology development programs determine estimates for use in program planning. The Transparent Cost Database collects program cost and performance

178

FORAST Database (DB1005)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Atmospheric Trace Gases » Ozone » FORAST Database Atmospheric Trace Gases » Ozone » FORAST Database FORAST Database DOI: 10.3334/CDIAC/vrc.db1005 data Data Investigators S. B. McLaughlin, D. J. Downing, T. J. Blasing, B. L. Jackson, D. J. Pack, D. N. Duvick, L. K. Mann, and T. W. Doyle Description The Forest Responses to Anthropogenic Stress (FORAST) project was designed (1) to determine whether evidence of alterations of long-term growth patterns of several species of eastern forest trees was apparent in tree-ring chronologies from within the region and (2) to identify environmental variables that were temporally or spatially correlated with any observed changes. The project was supported principally by the U.S. Environmental Protection Agency (EPA) with additional support from the National Park Service.

179

ARTI Refrigerant Database  

SciTech Connect (OSTI)

The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on R-32, R-123, R-124, R- 125, R-134a, R-141b, R142b, R-143a, R-152a, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses polyalkylene glycol (PAG), ester, and other lubricants. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits.

Calm, J.M.

1992-04-30T23:59:59.000Z

180

Complex Glazing Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1.2 1.2 This is a Beta version of the Complex Glazing Database (CGDB) for WINDOW 6. The data in the list below was measured by LBNL for this first data set. In the future, LBNL will publish measurement and submittal procedures so that manufacturers can submit their own data to LBNL for review and inclusion in subsequent databases, in a similar fashion to the International Glazing Database (IGDB). The numbering scheme for each manufacturer is a Beta scheme and will be further developed in the next few months. Alkenz USA Inc Shading Material Name BSDF XML File Shading Layer Name ID Type Sunshadow 3000, N901 Charcoal (SA-31) 2011-SA31.XML Sunshadow 3000, N901 Charcoal (WS) 7000 BSDF File Sunshadow 3100, N002 white/bone (SA-30) 2011-SA30.XML Sunshadow 3100, N002 white/bone (WS)

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

182

Improving the security of quantum direct communication with authentication  

E-Print Network [OSTI]

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

183

Relational Database SQL: Querying the Relational DB  

E-Print Network [OSTI]

: auto-completion and command history Weigang Qiu Relational Database & SQL #12;Relational Database SQLRelational Database SQL: Querying the Relational DB Workshop: the "genome" Database Relational Database & SQL Weigang Qiu Department of Biological Sciences Hunter College BIOL 425 Computational

Qiu, Weigang

184

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

185

DDI and Relational Databases  

E-Print Network [OSTI]

will use Access for modelling some examples during the workshop It is not an ideal solution for DDI as the database engine is quite limited as it is not fully ANSI-SQL compliant In reality you should use a ‘real’ SQL engine like e.g. MySQL Postgre... versions of DDI (e.g. DDI-L 3.0, 3.1, 3.2) and ensuring application compatibility with the original standard DDI Applications Pros of relational databases in regards to DDI Structure is very good for rectangular files (e.g. SPSS or Stata) Easier...

Amin, Alerk; Barkow, Ingo

2013-04-04T23:59:59.000Z

186

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect (OSTI)

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

187

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect (OSTI)

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

188

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

189

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

190

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

191

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

192

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

193

Database Archiving: How to Keep Lots of Data for a Very Long Time, 1st edition  

Science Journals Connector (OSTI)

With the amount of data a business accumulates now doubling every 12 to 18 months, IT professionals need to know how to develop a system for archiving important database data, in a way that both satisfies regulatory requirements and is durable and secure. ... Keywords: Database Management, Information Management, Information Technology, Library & Information Science

Jack E. Olson

2008-11-01T23:59:59.000Z

194

High Performance Buildings Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The High Performance Buildings Database is a shared resource for the building industry, a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad. The database includes information on the energy use, environmental performance, design process, finances, and other aspects of each project. Members of the design and construction teams are listed, as are sources for additional information. In total, up to twelve screens of detailed information are provided for each project profile. Projects range in size from small single-family homes or tenant fit-outs within buildings to large commercial and institutional buildings and even entire campuses. The database is a data repository as well. A series of Web-based data-entry templates allows anyone to enter information about a building project into the database. Once a project has been submitted, each of the partner organizations can review the entry and choose whether or not to publish that particular project on its own Web site.

195

E-Print Network 3.0 - authentic cost calculations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

196

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

197

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

198

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

199

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

200

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Password management strategies for online accounts  

Science Journals Connector (OSTI)

Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability; ... Keywords: password, password management, password reuse, security, survey, user behavior

Shirley Gaw; Edward W. Felten

2006-07-01T23:59:59.000Z

202

The Comprehensive Pacific Rainfall Database  

Science Journals Connector (OSTI)

This paper describes the Comprehensive Pacific Rainfall Database (PACRAIN), which contains daily and monthly precipitation records from the tropical Pacific basin. The database is a collection of observations from a variety of sources, including ...

J. Scott Greene; Michael Klatt; Mark Morrissey; Susan Postawko

2008-01-01T23:59:59.000Z

203

ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS  

E-Print Network [OSTI]

· Environmental Database Development and Management · Storm Water Modeling #12;ENVIRONMENTAL COMPLIANCE SERVICES CENTER FOR ENVIRONMENTAL MANAGEMENT OF MILITARY LANDS CEMML of environmental managers. The Center provides assistance to environmental managers in compliance areas such as air

204

database | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NETL's Carbon Capture, Utilization, & Storage Database - Ver. 4 Research and Development Infrastructure Global NATCARBAtlas Program Plan Project Portfolio Publications Carbon...

205

Industrial Assistance and Projects Databases  

Broader source: Energy.gov [DOE]

The databases listed here provide information on energy assessments, results and recommendations, contacts, and incentives for manufacturers.

206

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

207

Anual Energy Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Annual Energy Database Annual Energy Database Over the past several years, the National Fenestration Rating Council (NFRC) has developed technical procedures for determining the thermal performance properties of fenestration products. These properties document the thermal performance of the product in response to specific physical effects. U-factors define heat transfer as a function of temperature differences, Solar Heat Gain Coefficients are the fraction of incident solar radiation transmitted into the space, and Air Infiltration measures heat transfer as a function of a pressure differential. For the consumer or lay-person looking to understand the energy (heating and/or cooling) impacts of specific windows in typical residential applications, and to select an appropriate window for their application,

208

Energy Efficient Cities Initiative Project Database | Open Energy  

Open Energy Info (EERE)

Energy Efficient Cities Initiative Project Database Energy Efficient Cities Initiative Project Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy Efficient Cities Initiative Project Database Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Energy Efficiency, Buildings, Industry Topics: Background analysis Resource Type: Dataset, Lessons learned/best practices, Case studies/examples Website: esmap.org/esmap/node/231 Country: India, South Africa, Colombia, China, United States, Mexico, Pakistan, Egypt, Brazil, New Zealand, Singapore, Japan, Australia UN Region: Northern Africa, Southern Africa, Central America, South America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Australia and New Zealand

209

Buildings Performance Database  

Broader source: Energy.gov (indexed) [DOE]

DOE Buildings Performance DOE Buildings Performance Database Paul Mathew Lawrence Berkeley National Laboratory pamathew@lbl.gov (510) 486 5116 April 3, 2013 Standard Data Spec API 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: * Large-scale high-quality empirical data on building energy performance is critical to support decision- making and increase confidence in energy efficiency investments. * While there are a many potential sources for such data,

210

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

Calm, J.M.

1996-11-15T23:59:59.000Z

211

Montana State Antiquities Database | Open Energy Information  

Open Energy Info (EERE)

Antiquities Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana State Antiquities Database Abstract Database contains cultural resource...

212

Mathematics Database ZMATH MSC 2000  

E-Print Network [OSTI]

Reviewer Service Subscription »ZMATH« ZMATH Database | Advanced Search Print ZMATH Database Simple Search Advanced Search Command Search Advanced Search Query: an:0852.4600 Fill in the form and click »SearchLanguage: English Search: ZMATH Contact World of Mathematics Database »ZMATH« MSC 2000 MSC 2010

Kutateladze, Semen Samsonovich

213

Review: The Object Database Handbook  

Science Journals Connector (OSTI)

......Review: The Object Database Handbook Reviewed by Mike Jackson School...ac.uk The Object Database Handbook Douglas K Barry John Wiley...ac.uk The Object Database Handbook Douglas K Barry John Wiley...object-based approach, the book does not outline any circumstances......

Mike Jackson

1997-02-01T23:59:59.000Z

214

ARTI refrigerant database  

SciTech Connect (OSTI)

The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates. Citations in this report are divided into the following topics: thermophysical properties; materials compatibility; lubricants and tribology; application data; safety; test and analysis methods; impacts; regulatory actions; substitute refrigerants; identification; absorption and adsorption; research programs; and miscellaneous documents. Information is also presented on ordering instructions for the computerized version.

Calm, J.M. [Calm (James M.), Great Falls, VA (United States)] [Calm (James M.), Great Falls, VA (United States)

1996-04-15T23:59:59.000Z

215

Commercial equipment cost database  

SciTech Connect (OSTI)

This report, prepared for DOE, Office of Codes and Standards, as part of the Commercial Equipment Standards Program at Pacific Northwest Laboratory, specifically addresses the equipment cost estimates used to evaluate the economic impacts of revised standards. A database including commercial equipment list prices and estimated contractor costs was developed, and through statistical modeling, estimated contractor costs are related to equipment parameters including performance. These models are then used to evaluate cost estimates developed by the ASHRAE 90.1 Standing Standards Project Committee, which is in the process of developing a revised ASHRAE 90.1 standard. The database will also be used to support further evaluation of the manufacturer and consumer impacts of standards. Cost estimates developed from the database will serve as inputs to economic modeling tools, which will be used to estimate these impacts. Preliminary results suggest that list pricing is a suitable measure from which to estimate contractor costs for commercial equipment. Models developed from these cost estimates accurately predict estimated costs. The models also confirm the expected relationships between equipment characteristics and cost. Cost models were developed for gas-fired and electric water heaters, gas-fired packaged boilers, and warm air furnaces for indoor installation. Because of industry concerns about the use of the data, information was not available for the other categories of EPAct-covered equipment. These concerns must be addressed to extend the analysis to all EPAct equipment categories.

Freeman, S.L.

1995-01-01T23:59:59.000Z

216

A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility  

Science Journals Connector (OSTI)

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito

2012-01-01T23:59:59.000Z

217

Using the CIM Conceptualization in Autonomic System Management: the System Management Ontology Project  

E-Print Network [OSTI]

Using the CIM Conceptualization in Autonomic System Management: the System Management Ontology management domain. This conceptualization layer, or ontology, would provide the appropriate vocabulary across multiple organizations. The CIM standard #12;schemas, on which system databases on CIM

Calvanese, Diego

218

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

219

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

220

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

222

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

223

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

224

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

225

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

226

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network [OSTI]

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

227

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

228

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

229

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

230

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

231

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

232

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

233

Webinar: Hydrogen Storage Materials Database Demonstration |...  

Broader source: Energy.gov (indexed) [DOE]

Storage Materials Database Demonstration Webinar: Hydrogen Storage Materials Database Demonstration Presentation slides from the Fuel Cell Technologies Office webinar "Hydrogen...

234

Hydrogen Storage Materials Database Demonstration | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Storage Materials Database Demonstration Hydrogen Storage Materials Database Demonstration Presentation slides from the Fuel Cell Technologies Office webinar "Hydrogen Storage...

235

ORISE: Asset Readiness Management System (ARMS)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Asset Readiness Management System (ARMS) Database tracks emergency response exercises and equipment to help DOE asses emergency preparedness Developed by the Oak Ridge Institute...

236

Chesapeake Bay Program Water Quality Database | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chesapeake Bay Program Water Quality Database Chesapeake Bay Program Water Quality Database Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov » Communities » Ocean » Data Chesapeake Bay Program Water Quality Database Dataset Summary Description The Chesapeake Information Management System (CIMS), designed in 1996, is an integrated, accessible information management system for the Chesapeake Bay Region. CIMS is an organized, distributed library of information and software tools designed to increase basin-wide public access to Chesapeake Bay information. The information delivered by CIMS includes technical and public information, educational material, environmental indicators, policy documents, and scientific data. Through the use of relational databases, web-based programming, and web-based GIS a large number of Internet resources have been established. These resources include multiple distributed on-line databases, on-demand graphing and mapping of environmental data, and geographic searching tools for environmental information. Baseline monitoring data, summarized data and environmental indicators that document ecosystem status and trends, confirm linkages between water quality, habitat quality and abundance, and the distribution and integrity of biological populations are also available. One of the major features of the CIMS network is the Chesapeake Bay Program's Data Hub, providing users access to a suite of long- term water quality and living resources databases. Chesapeake Bay mainstem and tidal tributary water quality, benthic macroinvertebrates, toxics, plankton, and fluorescence data can be obtained for a network of over 800 monitoring stations.

237

Energy Citations Database (ECD) - Widget  

Office of Scientific and Technical Information (OSTI)

Energy Citations Database Widget Energy Citations Database Widget You can access key features from the Department of Energy's Office of Scientific and Technical Information (DOE/OSTI) by downloading the Energy Citations Database widget. Use the widget to search, receive alerts, and top documents. If you wish you may download and install this widget using its html inclusion code. Get the Energy Citations Database widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info) Search: provides the capability to search the Energy Citations Database collection of science research citations and documents. Alerts: provides the functionally for users with e-mail notification of updates to website content in specific areas of interest. By registering with Energy Citations Database, users can select search queries that are

238

Anual Energy Databases for Download  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Annual Energy Databases & Modeling Assumptions The following Annual Energy Databases and Documentation can be downloaded from this page: Custom AEP Rating Calculator (Draft November 2001) Original NFRC900 database (542Kb, Excel spreadsheet) developed and approved by NFRC Annual Energy Subcommittee of heating and cooling energies, for 14 typical windows, in 52 North American climates, for typical new houses. Database for Discussion by NFRC Annual Energy Subcommittee: New Homes; 34 RESFEN windows with an infiltration rate of 0.3 cfm/sf; 52 North American climates Database for Discussion by NFRC Annual Energy Subcommittee: Existing Homes; 34 RESFEN windows with an infiltration rate of 0.3 cfm/sf; 52 North American climates RESFEN Modeling Assumptions: Documentation of the modeling assumptions used for all the RESFEN databases

239

Download Data | Transparent Cost Database  

Open Energy Info (EERE)

in the database does not represent approval of the estimates by DOE or NREL. Levelized cost calculations DO NOT represent real world market conditions. The calculation uses a...

240

Biological & Environmental Research Abstracts Database  

Office of Scientific and Technical Information (OSTI)

Welcome to the Biological and Environmental Research Abstracts Database The U.S. Department of Energy's Office of Biological and Environmental Research (BER) conducts research in...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Incremental elasticity for array databases  

E-Print Network [OSTI]

Relational databases benefit significantly from elasticity, whereby they execute on a set of changing hardware resources provisioned to match their storage and processing requirements. Such flexibility is especially ...

Duggan, Jennie

242

The Coal Transportation Rate Database  

Gasoline and Diesel Fuel Update (EIA)

Coal Transportation Rate Database (CTRDB) adds new data for 2000 and 2001. The Federal Energy Regulatory Commission's (FERC) Form 580 "interrogatories" are the primary source for...

243

Hydrogen Storage Materials Database Demonstration  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

| Fuel Cell Technologies Program Source: US DOE 4252011 eere.energy.gov Hydrogen Storage Materials Database Demonstration FUEL CELL TECHNOLOGIES PROGRAM Ned Stetson Storage Tech...

244

DOE Patents Database - FAQ's  

Office of Scientific and Technical Information (OSTI)

Frequently Asked Questions Frequently Asked Questions Why was this database developed and by whom? How is this collection different than the one at the United States Patent and Trademark Office? What are the criteria for including patent records in this collection? How do you determine these patents were sponsored by DOE? How many patents are in this collection? Does the collection include all of DOE's patents? Does this collection include the full text for each patent? What time frame is covered by DOepatents? How often is this collection and Web site updated? Does the U.S. Government have exclusive rights to these inventions? What is OSTI? Where can I find information about doing business with DOE? How can I find additional information on the patenting process? Where can I find patents that are not related to DOE?

245

DOE Patents Database - About  

Office of Scientific and Technical Information (OSTI)

About DOepatents About DOepatents DOepatents, developed by the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI), is a searchable database of patent information resulting from DOE-sponsored research and development (R&D). Included here are patents that DOE sponsored through a variety of funding mechanisms, including grants, contracts, or cooperative agreements. Comprehensive coverage of DOE patent information is one way to demonstrate the Department's contribution to scientific progress in the physical sciences and other disciplines. Publicly available patent information from DOE R&D, historic and current, is presented here, excluding patent applications. DOepatents consists of bibliographic records, with full text where available, either via a PDF file or an HTML link to the record at the

246

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Broader source: Energy.gov (indexed) [DOE]

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ď‚· An EITS provided Exchange email account ď‚· A DOE issued HSPD-12 badge ď‚· DOEnet or Internet access and a supported web browser ď‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

247

Risk Management Tool Attributes:  

Broader source: Energy.gov (indexed) [DOE]

- Tools & SMEs - Tools & SMEs Outline for Breakout Session TOOLS 1. Types of Tools a. Risk Management - Database & Reports, risk register, risk forms, risk tracking & monitoring, basis of estimate, action item tracking, historical record of risks & changes, configuration control, enterprise-wide, metrics, risk performance index, risk checklist, graphical display, management reporting (various levels), risk communications b. Risk Analysis i. Cost, ii. budgets, funding, cash-flow analysis, iii. Schedule iv. tailoring categories v. Integrated Cost & Schedule vi. Project phase analysis; organization ownership & joint planning c. Risk Knowledge and Lessons Learned Database i. Enterprise-wide ii. Job/owner-specific iii. Workshops - project specific, risk management,

248

X-ray: towards integrating XML and relational database systems  

Science Journals Connector (OSTI)

Relational databases get more and more employed in order to store the content of a web site. At the same time, XML is fast emerging as the dominant standard at the hypertext level of web site management describing pages and links between them. Thus, ...

Gerti Kappel; Elisabeth Kapsammer; Stefan Rausch-Schott; Werner Retschitzegger

2000-10-01T23:59:59.000Z

249

TOWARDS UNIFYING DATABASE SCHEDULING AND  

E-Print Network [OSTI]

1 TOWARDS UNIFYING DATABASE SCHEDULING AND CONCURRENCY CONTROL: A FRONTIER APPROACH Gregory Jones previous work in real-time database concurrency control indexconcur- rency control and scheduling has focused on combiningvariations of traditional concurrency control techniques with real-time scheduling

Rhode Island, University of

250

TD Ameritrade suffers database hack  

Science Journals Connector (OSTI)

Online Brokerage TD Ameritrade has suffered a database hack. Client information such as addresses and phone numbers were accessed from the database. Although social security numbers, account numbers and date of birth details were within reach of the hacker, the sensitive information was left untouched according to Ameritrade.

2007-01-01T23:59:59.000Z

251

PARALLEL DATABASE MACHINES Kjell Bratbergsengen  

E-Print Network [OSTI]

by NFR formerly NTNF, Intel Norway AS, Eltron AS and Norwegian Telecom. 1 February 13, 1996 8:51 am #12 The Norwegian Institute of Technology University of Trondheim Email: kjellb@idt.unit.no Summary The idea and database servers for "new" data types, notably film and video. THE TRAUMATIC HISTORY OF DATABASE COMPUTERS

252

Temporal Databases Status and Research Directions  

E-Print Network [OSTI]

these databases several thousand years and look up the (then current) grain harvest. Oral histories, e.g., Homer transaction time, recording a history of updates made to the database. Such a database supports rollback to a previous stored state of the database. An historical database supports valid time, recording a history

Snodgrass, Richard T.

253

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

254

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

255

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

256

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

257

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

258

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

259

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

260

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ová; G. Greif; Z. Kohajdová; J. Lehkoživová

2006-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

262

DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN,  

E-Print Network [OSTI]

i DEVELOPMENT OF DATABASE ON FECAL SLUDGE COLLECTION, TREATMENT AND DISPOSAL IN THACHIN, CHAOPRAYA Sludge (FS) management and lacking of data on FS collection, treatment and disposal. Nevertheless, FS

Richner, Heinz

263

The Impact of Databases on Knowledge Transfer: Simulation Providing Craig Schreiber  

E-Print Network [OSTI]

Management, Knowledge Transfer, Organizational Learning, Transactive Memory, Databases, Information and Organizational Systems Carnegie Mellon University Pittsburgh, Pennsylvania 15213 Abstract of Social and Organizational Systems Carnegie Mellon University Wean Hall 1325 Pittsburgh, Pennsylvania

Sadeh, Norman M.

264

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Broader source: Energy.gov (indexed) [DOE]

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

265

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

266

Energy Citations Database (ECD) - About  

Office of Scientific and Technical Information (OSTI)

About ECD About ECD The Energy Citations Database (1943 - Present) was developed by the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) to improve access to Departmental and predecessor agency scientific and technical information (STI). The Energy Citations Database (ECD) contains bibliographic citations for energy and energy related STI from the Department of Energy (DOE) and its predecessor agencies, the Energy Research & Development Administration (ERDA) and the Atomic Energy Commission (AEC). The Database provides access to electronic documents, primarily from 1943 forward, with continued growth through regular updates. Features of ECD include: bibliographic citations for scientific and technical information dating from 1943 to the present;

267

REDD Country Activity Database | Open Energy Information  

Open Energy Info (EERE)

REDD Country Activity Database REDD Country Activity Database Jump to: navigation, search Tool Summary Name: REDD Country Activity Database Agency/Company /Organization: Global Canopy Programme, Forum on Readiness for REDD Sector: Land Focus Area: Forestry Topics: Background analysis Resource Type: Dataset, Case studies/examples User Interface: Website Website: www.theredddesk.org/countries Country: Brazil, Cameroon, Vietnam, Guyana, Tanzania, Indonesia Cost: Free UN Region: Southern Africa, South America, South-Eastern Asia REDD Country Activity Database Screenshot References: REDD Country Activity Database[1] Logo: REDD Country Activity Database The REDD Countries Database is a centralised and collaborative database of the diverse and rapidly evolving range of ongoing REDD activities in

268

Database | OpenEI Community  

Open Energy Info (EERE)

Database Database Home Kyoung's picture Submitted by Kyoung(155) Contributor 14 October, 2013 - 20:19 Geothermal NEPA Workshop at GRC Categorical Exclusions CX Database EA EIS FONSI GEA GRC GRR NEPA On Tuesday, October 2, the Geothermal Technology Office and the National Renewable Energy Laboratory held a 1/2-day NEPA workshop. The workshop was held at the MGM Grand in Las Vegas, in conjunction with the GEA/GRC Tradeshow and Conference. Three presentations were given, describing the NEPA database and associated analysis that had been conducted in 2013. Files: application/vnd.openxmlformats-officedocument.presentationml.presentation icon 2. NEPA History - Presentation application/vnd.openxmlformats-officedocument.presentationml.presentation icon 3. Categorical Exclusions - Presentation

269

Energy Citations Database (ECD) - Comments  

Office of Scientific and Technical Information (OSTI)

Contact Us If you have a question about Energy Citations Database, we recommend you check frequently asked questions. If your question still has not been answered or if you wish to...

270

Introduction: Landslide Inventories and Databases  

Science Journals Connector (OSTI)

This is a short introduction to the Session B9 of the WLF3 entitled “Inventory and Database” with summarized overview of all contributions. Papers included in this part of the volume deals with landslide mappi...

Snježana Mihali? Arbanas; Marko Komac…

2014-01-01T23:59:59.000Z

271

Hydrogen Storage Materials Database Demonstration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| Fuel Cell Technologies Program Source: US DOE 4/25/2011 eere.energy.gov | Fuel Cell Technologies Program Source: US DOE 4/25/2011 eere.energy.gov Hydrogen Storage Materials Database Demonstration FUEL CELL TECHNOLOGIES PROGRAM Ned Stetson Storage Tech Team Lead Fuel Cell Technologies Program U.S. Department of Energy 12/13/2011 Hydrogen Storage Materials Database Marni Lenahan December 13, 2011 Database Background * The Hydrogen Storage Materials Database was built to retain information from DOE Hydrogen Storage funded research and make these data more accessible. * Data includes properties of hydrogen storage materials investigated such as synthesis conditions, sorption and release conditions, capacities, thermodynamics, etc. http://hydrogenmaterialssearch.govtools.us Current Status * Data continues to be collected from DOE funded research.

272

World electric power plants database  

SciTech Connect (OSTI)

This global database provides records for 104,000 generating units in over 220 countries. These units include installed and projected facilities, central stations and distributed plants operated by utilities, independent power companies and commercial and self-generators. Each record includes information on: geographic location and operating company; technology, fuel and boiler; generator manufacturers; steam conditions; unit capacity and age; turbine/engine; architect/engineer and constructor; and pollution control equipment. The database is issued quarterly.

NONE

2006-06-15T23:59:59.000Z

273

Access to DOE Database of Oil and Natural Gas Research Results Expanded |  

Broader source: Energy.gov (indexed) [DOE]

Access to DOE Database of Oil and Natural Gas Research Results Access to DOE Database of Oil and Natural Gas Research Results Expanded Access to DOE Database of Oil and Natural Gas Research Results Expanded January 12, 2011 - 12:00pm Addthis Washington, DC - The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. TheOnePetro website now contains NETL's Oil & Gas Knowledge Management Database. DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported

274

This is for information purposes only. Please plan your own program and refer to the University of Lethbridge Calendar for complete information. Contact the Undergraduate Programs Office in the Faculty of Management for advising information (E480; tel. 40  

E-Print Network [OSTI]

Environment Management 3040 - Finance Management 3051/Political Science 3421 - Managing People Development Management 3821 - Visual Programming Applications Management 4090 - Management Policy and Strategy Database Applications One of A or B: A. *Computer Science 3720 - Introduction to Software Engineering

Seldin, Jonathan P.

275

Summary of Bugs Database Jeremy Kepner  

E-Print Network [OSTI]

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

276

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

running HP software products should be applied in accordance with the customer's patch management policy. Recommended Update: HP Software media set 6.3 HP Insight Software...

277

Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)  

SciTech Connect (OSTI)

This annual report describes progress of the project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is working to provide advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. The MIDCARB project is developing improved online tools to provide real-time display and analyze CO{sub 2} sequestration data. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

Timothy R. Carr; Scott W. White

2002-06-01T23:59:59.000Z

278

Evaluation of database technologies for the CTBT Knowledge Base prototype  

SciTech Connect (OSTI)

This document examines a number of different software technologies in the rapidly changing field of database management systems, evaluates these systems in light of the expected needs of the Comprehensive Test Ban Treaty (CTBT) Knowledge Base, and makes some recommendations for the initial prototypes of the Knowledge Base. The Knowledge Base requirements are examined and then used as criteria for evaluation of the database management options. A mock-up of the data expected in the Knowledge Base is used as a basis for examining how four different database technologies deal with the problems of storing and retrieving the data. Based on these requirement and the results of the evaluation, the recommendation is that the Illustra database be considered for the initial prototype of the Knowledge Base. Illustra offers a unique blend of performance, flexibility, and features that will aid in the implementation of the prototype. At the same time, Illustra provides a high level of compatibility with the hardware and software environments present at the US NDC (National Data Center) and the PIDC (Prototype International Data Center).

Keyser, R.; Shepard-Dombroski, E.; Baur, D.; Hipp, J.; Moore, S.; Young, C.; Chael, E.

1996-11-01T23:59:59.000Z

279

Exporter Database | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Exporter Database Exporter Database Manufacturing Data/Tools Research/Tech Services Apps Challenges Blogs Let's Talk Manufacturing You are here Data.gov » Communities » Manufacturing » Data Exporter Database Dataset Summary Description This tool provides a statistical overview and tables outlining the export activities of U.S. small and medium-sized enterprises (SMEs), which are defined as firms that have fewer than 500 employees. All figures in this overview and tables include only identifiable or "known" exports, i.e., exports that can be linked to individual companies using information on U.S. export declarations. Tags {exporter,"small and medium businesses",SME} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access

280

Energy Citations Database (ECD) - FAQ  

Office of Scientific and Technical Information (OSTI)

ECD Frequently Asked Questions (FAQs) What does the Energy Citations Database (ECD) contain? and what is the date range of the content? When was ECD created and why? What are the topics in ECD? Search Architecture - What Is under the hood? How often are documents added to the database? Is Energy Citations Database (ECD) the electronic equivalent of Energy Research Abstracts (ERA)? How do I find a document in ECD? How do I know if a document is available electronically? Of what value is a citation without an electronic document? How do I download a document? how long will it take? and how much will it cost? If I am interested in just a few pages, can I download only those pages of interest? Can I capture citations using Zotero? How do I get a copy of a journal article?

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

DOE Global Energy Storage Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The DOE International Energy Storage Database has more than 400 documented energy storage projects from 34 countries around the world. The database provides free, up-to-date information on grid-connected energy storage projects and relevant state and federal policies. More than 50 energy storage technologies are represented worldwide, including multiple battery technologies, compressed air energy storage, flywheels, gravel energy storage, hydrogen energy storage, pumped hydroelectric, superconducting magnetic energy storage, and thermal energy storage. The policy section of the database shows 18 federal and state policies addressing grid-connected energy storage, from rules and regulations to tariffs and other financial incentives. It is funded through DOE’s Sandia National Laboratories, and has been operating since January 2012.

282

About the Building Performance Database  

Broader source: Energy.gov [DOE]

Recent technology, market and policy drivers - smart meters, energy performance disclosure laws, etc. - are resulting in a rapid increase in generation of data about buildings and their energy performance. But this data is still hard to access, and analyze because it is being housed in many decentralized and often proprietary databases. The DOE Building Performance Database (BPD) aims to bridge this gap by compiling and cleansing a large dataset required to assess the likely performance of energy efficiency retrofit measures and services. By making the data available anonymously and in aggregate, the BPD enables the public to gain value from the data while addressing the privacy needs of contributors.

283

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

284

Challenge to British forensic database  

Science Journals Connector (OSTI)

... London THE British civil rights group Liberty is seeking to take London's Metropolitan Police to the European Court of Human Rights ... Court of Human Rights, questioning the legality of its database of DNA fingerprinting results. Liberty's argument turns on the case of Roy Williams, a man questioned during a ...

Peter Aldhous

1992-01-16T23:59:59.000Z

285

Building Performance Database Analysis Tools  

Broader source: Energy.gov [DOE]

The BPD statistically analyzes the energy performance and physical and operational characteristics of real commercial and residential buildings. The Buildings Performance Database offers two primary methods to analyze building performance data. These are “Explore”, which allows users to browse a single dataset within the BPD, and “Compare”, which allowed users to compare multiple datasets within the BPD side-by-side.

286

Hardware Security for Device Authentication in the Smart Grid  

Science Journals Connector (OSTI)

Secure communication between devices is a key aspect of smart grid security. In the future smart home...environment, various smart devices, appliances and energy management systems will communicate with each othe...

Andrew J. Paverd; Andrew P. Martin

2013-01-01T23:59:59.000Z

287

WTO Subsidy Notifications Database | Open Energy Information  

Open Energy Info (EERE)

WTO Subsidy Notifications Database WTO Subsidy Notifications Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: WTO Subsidy Notifications Database Agency/Company /Organization: World Trade Organization Topics: Finance, Market analysis, Policies/deployment programs Resource Type: Dataset Website: www.globalsubsidies.org/private/modules/knowledgebox/external/index.ph WTO Subsidy Notifications Database Screenshot References: WTO Subsidy Database[1] Overview "This searchable database provides links to the WTO's new and full subsidy notifications. Notifications are indexed by country, date of publication, symbol, period in which the subsidies are reported, and - though it should not be considered exhaustive - the sectors to which subsidies have been granted." References

288

Addison Wesley Longman, Inc. 2000, Elmasri/Navathe, Fundamentals of Database Systems, Third Edition FName MInit LName  

E-Print Network [OSTI]

/Navathe, Fundamentals of Database Systems, Third Edition FName Name LNameMInit BDate FOfficeSalary SsnSex Rank FPhone© Addison Wesley Longman, Inc. 2000, Elmasri/Navathe, Fundamentals of Database Systems, Third_EMPLOYEE SALARIED_EMPLOYEE TRADE_UNIONPROJECT MANAGES BELONGS_TO PayScale Salary EngTypeTGradeTypingSpeed d Three

Chen, Yangjun

289

DOE to Unveil New Online Database of Oil and Natural Gas Research Results |  

Broader source: Energy.gov (indexed) [DOE]

DOE to Unveil New Online Database of Oil and Natural Gas Research DOE to Unveil New Online Database of Oil and Natural Gas Research Results DOE to Unveil New Online Database of Oil and Natural Gas Research Results October 2, 2009 - 1:00pm Addthis Washington, DC - The U.S. Department of Energy plans to introduce a new, user-friendly online repository of oil and natural gas research results at the Society of Petroleum Engineers' Annual Technical Conference and Exhibition, to be held in New Orleans, La., October 4-7, 2009. By providing easy access to the results of nearly four decades of research supported by the Office of Fossil Energy's Oil and Natural Gas Program, the knowledge management database could ultimately help boost recovery of the nation's oil and gas resources. The database largely evolved from a recommendation made by the Federal

290

NETL: 2010 World Gasification Database Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home > Technologies > Coal & Power Systems > Gasification Systems > 2010 World Gasification Database Home > Technologies > Coal & Power Systems > Gasification Systems > 2010 World Gasification Database Gasification Systems 2010 Worldwide Gasification Database Archive DOE/NETL 2010 Worldwide Gasification Database Worldwide Gasification Database Analysis The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

291

Coal Power Plant Database | Open Energy Information  

Open Energy Info (EERE)

Power Plant Database Power Plant Database Jump to: navigation, search Name Coal Power Plant Database Data Format Excel Spreadsheet, Excel Pivot Table, Access Database Geographic Scope United States TODO: Import actual dataset contents into OpenEI The Coal Power Plant Database (CPPDB) is a dataset which "consolidates large quantities of information on coal-fired power plants in a single location."[1] It is produced by the National Energy Technology Laboratory (NETL). External links 2007 Edition Excel Spreadsheet Excel Pivot Table Access Database User's Manual (PDF) References ↑ "User's Manual: Coal Power Plant Database" Retrieved from "http://en.openei.org/w/index.php?title=Coal_Power_Plant_Database&oldid=273301" Categories: Datasets Articles with outstanding TODO tasks

292

6.830 Database Systems, Fall 2005  

E-Print Network [OSTI]

This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, ...

Madden, Samuel

293

Montana 310 Permit Database | Open Energy Information  

Open Energy Info (EERE)

Permit Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana 310 Permit Database Abstract Provides access to Montana's 310 permit mapping...

294

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

295

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

296

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

297

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jřrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sřren Husted

2011-03-21T23:59:59.000Z

298

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

299

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

300

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

302

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network [OSTI]

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

303

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network [OSTI]

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

304

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

305

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

306

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

307

GDB - Human Genome Database final report  

SciTech Connect (OSTI)

This is the DOE final report for the GDB, Human Genome Database, project at the Johns Hopkins University.

Talbot, C. Conover, Jr.

2002-01-08T23:59:59.000Z

308

Webinar: Hydrogen Storage Materials Database Demonstration  

Broader source: Energy.gov [DOE]

Video recording and text version of the webinar, Hydrogen Storage Materials Database Demonstration, originally presented on December 13, 2011.

309

Automatic Library Tracking Database Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Libraries » ALTD Libraries » ALTD ALTD Automatic Library Tracking Database Infrastructure To track and monitor library usage and better serve your software needs, we have enabled the Automatic Library Tracking Database (ALTD) on our prodcution systems, Hopper and Edison. ALTD is also availailable on Carver, but has not enabled for all users by default yet. ALTD, developed by National Institute for Computational Sciences, automatically and transparently tracks all libraries linked into an application at compile time, as well as the libraries used at run time, by intercepting the linker (ld) and the job launcher (aprun, or mpirun). It is a light-weight tool, and should not change your experience with compilation and execution of codes on the machine. However, if you encounter any problems due to ALTD,

310

Energy Citations Database (ECD) - Architecture  

Office of Scientific and Technical Information (OSTI)

Search Architecture - What Is under the hood? Search Architecture - What Is under the hood? The Energy Citations Database makes searchable over two million bibliographic citations for energy and energy related STI from the Department of Energy (DOE) and its predecessor agencies. This search is powered by traditional Web-based architecture. That is, a database and a set of citations are made searchable by a series of dynamic Web pages with persistent URLs (Web addresses). If a citation has associated full text then that content is also indexed and made searchable. The information consumer may perform a search against the entire record, both bibliographic citations and their associated full text, from the Basic Search feature. In addition, the user may perform fine grain searches by specific bibliographic citation fields and/or full text via the Fielded

311

Energy Citations Database (ECD) - Availability  

Office of Scientific and Technical Information (OSTI)

The Energy Citations Database (ECD) contains over 2.4 million bibliographic The Energy Citations Database (ECD) contains over 2.4 million bibliographic citations and over 307,000 full-text documents, primarily from 1943 forward. When an electronic document is available, an indicator is provided in the search results and on the bibliographic citation page. The electronic document may be accessed via a link to the document. To view an electronic document, click on the icon. (You must have Adobe Acrobat Reader plug-in [exit federal site] installed.) To download an electronic document, right-click on the icon and choose "Save Link As" or "Save Target As". In general, when an electronic document is not available, document availability information may be found on the Bibliographic Citation page in the Availability, Publisher, Author, Research Organization, and/or Resource

312

The Majorana Parts Tracking Database  

E-Print Network [OSTI]

The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

Abgrall, N; Avignone, F T; Bertrand, F E; Brudanin, V; Busch, M; Byram, D; Caldwell, A S; Chan, Y-D; Christofferson, C D; Combs, D C; Cuesta, C; Detwiler, J A; Doe, P J; Efremenko, Yu; Egorov, V; Ejiri, H; Elliott, S R; Esterline, J; Fast, J E; Finnerty, P; Fraenkle, F M; Galindo-Uribarri, A; Giovanetti, G K; Goett, J; Green, M P; Gruszko, J; Guiseppe, V E; Gusev, K; Hallin, A L; Hazama, R; Hegai, A; Henning, R; Hoppe, E W; Howard, S; Howe, M A; Keeter, K J; Kidd, M F; Kochetov, O; Kouzes, R T; LaFerriere, B D; Leon, J Diaz; Leviner, L E; Loach, J C; MacMullin, J; Martin, R D; Meijer, S J; Mertens, S; Miller, M L; Mizouni, L; Nomachi, M; Orrell, J L; O'Shaughnessy, C; Overman, N R; Petersburg, R; Phillips, D G; Poon, A W P; Pushkin, K; Radford, D C; Rager, J; Rielage, K; Robertson, R G H; Romero-Romero, E; Ronquest, M C; Shanks, B; Shima, T; Shirchenko, M; Snavely, K J; Snyder, N; Soin, A; Suriano, A M; Tedeschi, D; Thompson, J; Timkin, V; Tornow, W; Trimble, J E; Varner, R L; Vasilyev, S; Vetter, K; Vorren, K; White, B R; Wilkerson, J F; Wiseman, C; Xu, W; Yakushev, E; Young, A R; Yu, C -H; Zhitnikov, I

2015-01-01T23:59:59.000Z

313

The Majorana Parts Tracking Database  

E-Print Network [OSTI]

The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

The Majorana Collaboration; N. Abgrall; E. Aguayo; F. T. Avignone III; A. S. Barabash; F. E. Bertrand; V. Brudanin; M. Busch; D. Byram; A. S. Caldwell; Y-D. Chan; C. D. Christofferson; D. C. Combs; C. Cuesta; J. A. Detwiler; P. J. Doe; Yu. Efremenko; V. Egorov; H. Ejiri; S. R. Elliott; J. Esterline; J. E. Fast; P. Finnerty; F. M. Fraenkle; A. Galindo-Uribarri; G. K. Giovanetti; J. Goett; M. P. Green; J. Gruszko; V. E. Guiseppe; K. Gusev; A. L. Hallin; R. Hazama; A. Hegai; R. Henning; E. W. Hoppe; S. Howard; M. A. Howe; K. J. Keeter; M. F. Kidd; O. Kochetov; S. I. Konovalov; R. T. Kouzes; B. D. LaFerriere; J. Diaz Leon; L. E. Leviner; J. C. Loach; J. MacMullin; R. D. Martin; S. J. Meijer; S. Mertens; M. L. Miller; L. Mizouni; M. Nomachi; J. L. Orrell; C. O'Shaughnessy; N. R. Overman; R. Petersburg; D. G. Phillips II; A. W. P. Poon; K. Pushkin; D. C. Radford; J. Rager; K. Rielage; R. G. H. Robertson; E. Romero-Romero; M. C. Ronquest; B. Shanks; T. Shima; M. Shirchenko; K. J. Snavely; N. Snyder; A. Soin; A. M. Suriano; D. Tedeschi; J. Thompson; V. Timkin; W. Tornow; J. E. Trimble; R. L. Varner; S. Vasilyev; K. Vetter; K. Vorren; B. R. White; J. F. Wilkerson; C. Wiseman; W. Xu; E. Yakushev; A. R. Young; C. -H. Yu; V. Yumatov; I. Zhitnikov

2015-02-05T23:59:59.000Z

314

Technical Database | OpenEI  

Open Energy Info (EERE)

56 56 Varnish cache server Browse Upload data GDR 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142281756 Varnish cache server Technical Database Dataset Summary Description Technical Reference for Hydrogen Compatibility of Materials Source Sandia National Laboratories Date Released June 03rd, 2010 (4 years ago) Date Updated September 27th, 2012 (2 years ago) Keywords Compatibility of Materials hydrogen NREL Sandia Technical Database Technical Reference Data application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_cia85_ten_fra_fat.xlsx (xlsx, 60.9 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_san10_fra_fat.xlsx (xlsx, 58.5 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon 1100_san10b_fra_fat.xlsx (xlsx, 59.4 KiB)

315

DOE Science Showcase - Featured Climate Change Research from DOE Databases  

Office of Scientific and Technical Information (OSTI)

Featured Climate Change Research from DOE Databases Featured Climate Change Research from DOE Databases Search Results from DOE Databases View research documents, citations, accomplishments, patents, and projects related to climate change, one of the primary scientific challenges addressed through the Incite Program. Climate Change Information Bridge Energy Citations Database DOE R&D Accomplishments Database DOE Data Explorer Climate Modeling Information Bridge Energy Citations Database DOE R&D Accomplishments Database DOE Data Explorer Ocean Turbulence and Climate Information Bridge Energy Citations Database DOE Accomplishments Database DOE Data Explorer Cloud Simulation and Models Information Bridge Energy Citations Database DOE Accomplishments Database DOE Data Explorer Global Warming Information Bridge Energy Citations Database

316

Webinar: NREL's Fuel Cell Contaminant Database | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

NREL's Fuel Cell Contaminant Database Webinar: NREL's Fuel Cell Contaminant Database Below is the text version of the webinar titled "NREL's Fuel Cell Contaminant Database,"...

317

Buildings Performance Database - Datasets - OpenEI Datasets  

Open Energy Info (EERE)

Buildings Performance Database Dataset Activity Stream Buildings Performance Database The Buildings Performance Database (BPD) unlocks the power of building energy performance...

318

SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes  

E-Print Network [OSTI]

SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes Genevieve attributes. Next, we build the "SUN attribute database" on top of the diverse SUN categorical database. Our

Hays, James

319

Geological and geotechnical databases and developments  

E-Print Network [OSTI]

Geological and geotechnical databases and developments in the Netherlands Robert Hack & Wiebke Tegtmeier Namur, Belgium, 9 October 2007 #12;9 October 2007 Geological and geotech databases in NL - Hack 2007 Geological and geotech databases in NL - Hack & Tegtmeier 3 Surface data: · Climate · Vegetation

Hack, Robert

320

Data Modelling and Database Requirements Geographical Data  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Brief history 15 Definitions 15 The three-schema architecture 16 Features/services of databaseData Modelling and Database Requirements for Geographical Data HĂĄvard Tveite January, 1997 #12-Model Substitution, and adds new symbology that is relevant for geographical data. Database system requirements

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Supporting Database Provenance under Schema Evolution  

E-Print Network [OSTI]

,11] have significantly simplified the problems of preserving the history of the database schemaSupporting Database Provenance under Schema Evolution Shi Gao and Carlo Zaniolo University of California, Los Angeles {gaoshi, zaniolo}@cs.ucla.edu Abstract. Database schema upgrades are common in modern

Zaniolo, Carlo

322

NICMOS HISTORY DATABASE AND April 10, 1998  

E-Print Network [OSTI]

1 NICMOS HISTORY DATABASE AND WEB TOOLS C. Tullos April 10, 1998 ABSTRACT The history of NICMOS. The Database and Data A convenient way of keeping a history of some of the NICMOS instrument parameters parameters apply. Instrument Science Report OSG-CAL 98-01 #12;2 NICMOS HISTORY DATABASE LAYOUT 2. The Web

Sirianni, Marco

323

A Spreadsheet-Based User Interface for Managing Plural Relationships in Structured Data  

E-Print Network [OSTI]

A key feature of relational database applications is managing \\emph{plural} relationships---one-to-many and many-to-many---between entities. However, since it is often infeasible to adopt or develop a new database application ...

Bakke, Eirik

324

Geothermal NEPA Database on OpenEI (Poster)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) developed the Geothermal National Environmental Policy Act (NEPA) Database as a platform for government agencies and industry to access and maintain information related to geothermal NEPA documents. The data were collected to inform analyses of NEPA timelines, and the collected data were made publically available via this tool in case others might find the data useful. NREL staff and contractors collected documents from agency websites, during visits to the two busiest Bureau of Land Management (BLM) field offices for geothermal development, and through email and phone call requests from other BLM field offices. They then entered the information into the database, hosted by Open Energy Information (http://en.openei.org/wiki/RAPID/NEPA). The long-term success of the project will depend on the willingness of federal agencies, industry, and others to populate the database with NEPA and related documents, and to use the data for their own analyses. As the information and capabilities of the database expand, developers and agencies can save time on new NEPA reports by accessing a single location to research related activities, their potential impacts, and previously proposed and imposed mitigation measures. NREL used a wiki platform to allow industry and agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users.

Young, K. R.; Levine, A.

2014-09-01T23:59:59.000Z

325

Better Knowledge Management Through Knowledge Engineering  

E-Print Network [OSTI]

Better Knowledge Management Through Knowledge Engineering: A Case Study in Drilling Optimisation the term knowledge management has been used to describe the efforts of organisations to capture, store, and deploy knowledge. Most current knowledge management activities rely on database and web technology

Preece, Alun

326

An EAP ID-Based Authentication Method for Wireless Networks  

E-Print Network [OSTI]

(Certification Author- ity) and the burdensome management of certificates is removed. The presented) into IEEE 802 wired networks. It gave also birth to the IEEE 802.11i [2] which is more specific to wireless between two stations or a signature mechanism that lies on certificates to prove the ownership of a public

Paris-Sud XI, Université de

327

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

328

Using XML to Build Efficient Transaction-Time Temporal Database Systems on Relational Databases  

E-Print Network [OSTI]

(virtual) representations of the database history, (b) XQuery to express powerful temporal queriesUsing XML to Build Efficient Transaction-Time Temporal Database Systems on Relational Databases the ArchIS system that achieves full-functionality transaction-time databases without re- quiring temporal

Zaniolo, Carlo

329

Database specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB)  

SciTech Connect (OSTI)

This Database Specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB) describes the database organization and storage allocation, provides the detailed data model of the logical and physical designs, and provides information for the construction of parts of the database such as tables, data elements, and associated dictionaries and diagrams.

Faby, E.Z.; Fluker, J.; Hancock, B.R.; Grubb, J.W.; Russell, D.L. [Univ. of Tennessee, Knoxville, TN (United States)] [Univ. of Tennessee, Knoxville, TN (United States); Loftis, J.P.; Shipe, P.C.; Truett, L.F. [Oak Ridge National Lab., TN (United States)] [Oak Ridge National Lab., TN (United States)

1994-03-01T23:59:59.000Z

330

Configuration management program plan for Hanford site systems engineering  

SciTech Connect (OSTI)

This plan establishes the integrated management program for the evolving technical baseline developed through the systems engineering process. This configuration management program aligns with the criteria identified in the DOE Standard, DOE-STD-1073-93. Included are specific requirements for control of the systems engineering RDD-100 database, and electronic data incorporated in the database that establishes the Hanford Site Technical Baseline.

Kellie, C.L.

1996-03-28T23:59:59.000Z

331

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

332

Lessons Learned Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Lessons Learned Database Lessons Learned Database Lessons Learned Database The DOE Corporate Lessons Learned Database provides a central clearinghouse that allows ready access to and communication about collected information on a timely, unimpeded basis by all DOE elements. The database is used to collect and share lessons learned and best practices pertaining to all DOE activities Lessons Learned Database Login Welcome to the Lessons Learned site, the premier Web tool for online information sharing regarding Lessons Learned issues. Please login to access your profile, search the database, or submit a new Lesson Learned. User Log In: If you have already received your log in credentials for the DOE Lessons Learned system click here to log in. Create New Account: We do not allow anonymous access to this site. You must register for an

333

Overview of selected molecular biological databases  

SciTech Connect (OSTI)

This paper presents an overview of the purpose, content, and design of a subset of the currently available biological databases, with an emphasis on protein databases. Databases included in this summary are 3D-ALI, Berlin RNA databank, Blocks, DSSP, EMBL Nucleotide Database, EMP, ENZYME, FSSP, GDB, GenBank, HSSP, LiMB, PDB, PIR, PKCDD, ProSite, and SWISS-PROT. The goal is to provide a starting point for researchers who wish to take advantage of the myriad available databases. Rather than providing a complete explanation of each database, we present its content and form by explaining the details of typical entries. Pointers to more complete ``user guides`` are included, along with general information on where to search for a new database.

Rayl, K.D.; Gaasterland, T.

1994-11-01T23:59:59.000Z

334

From the LHC Reference Database to the Powering Interlock System  

E-Print Network [OSTI]

The protection of the magnet powering system for the Large Hadron Collider (LHC) currently being built at CERN is a major challenge due to the unprecedented complexity of the accelerator. The Powering Interlock System of the LHC will have to manage more than 1600 DC circuits for magnet powering, different in their structure, complexity and importance to the accelerator. For the coherent description of such complex system, a Reference Database as unique source of the parameters of the electrical circuits has been developed. The information, introduced via a generic circuit description language, is first used for installing the accelerator and making all electrical connections. The data is then used for tests and commissioning. During operation, the Powering Interlock System manages all critical functions. It consists of 36 PLC based controllers dis tributed around the machine and requires a flexible and transparent way of configuration, since each controller manages different numbers and types of electrical ci...

Dehavay, C; Schmidt, R; Veyrunes, E; Zerlauth, M

2003-01-01T23:59:59.000Z

335

Enhancing the DNA Patent Database  

SciTech Connect (OSTI)

Final Report on Award No. DE-FG0201ER63171 Principal Investigator: LeRoy B. Walters February 18, 2008 This project successfully completed its goal of surveying and reporting on the DNA patenting and licensing policies at 30 major U.S. academic institutions. The report of survey results was published in the January 2006 issue of Nature Biotechnology under the title “The Licensing of DNA Patents by US Academic Institutions: An Empirical Survey.” Lori Pressman was the lead author on this feature article. A PDF reprint of the article will be submitted to our Program Officer under separate cover. The project team has continued to update the DNA Patent Database on a weekly basis since the conclusion of the project. The database can be accessed at dnapatents.georgetown.edu. This database provides a valuable research tool for academic researchers, policymakers, and citizens. A report entitled Reaping the Benefits of Genomic and Proteomic Research: Intellectual Property Rights, Innovation, and Public Health was published in 2006 by the Committee on Intellectual Property Rights in Genomic and Protein Research and Innovation, Board on Science, Technology, and Economic Policy at the National Academies. The report was edited by Stephen A. Merrill and Anne-Marie Mazza. This report employed and then adapted the methodology developed by our research project and quoted our findings at several points. (The full report can be viewed online at the following URL: http://www.nap.edu/openbook.php?record_id=11487&page=R1). My colleagues and I are grateful for the research support of the ELSI program at the U.S. Department of Energy.

Walters, LeRoy B.

2008-02-18T23:59:59.000Z

336

Tri-party agreement databases, access mechanism and procedures. Revision 2  

SciTech Connect (OSTI)

This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc.

Brulotte, P.J.

1996-01-01T23:59:59.000Z

337

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network [OSTI]

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

338

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network [OSTI]

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

339

SSC lattice database and graphical interface  

SciTech Connect (OSTI)

When completed the Superconducting Super Collider will be the world's largest accelerator complex. In order to build this system on schedule, the use of database technologies will be essential. In this paper we discuss one of the database efforts underway at the SSC, the lattice database. The SSC lattice database provides a centralized source for the design of each major component of the accelerator complex. This includes the two collider rings, the High Energy Booster, Medium Energy Booster, Low Energy Booster, and the LINAC as well as transfer and test beam lines. These designs have been created using a menagerie of programs such as SYNCH, DIMAD, MAD, TRANSPORT, MAGIC, TRACE3D AND TEAPOT. However, once a design has been completed, it is entered into a uniform database schema in the database system. In this paper we discuss the reasons for creating the lattice database and its implementation via the commercial database system SYBASE. Each lattice in the lattice database is composed of a set of tables whose data structure can describe any of the SSC accelerator lattices. In order to allow the user community access to the databases, a programmatic interface known as dbsf (for database to several formats) has been written. Dbsf creates ascii input files appropriate to the above mentioned accelerator design programs. In addition it has a binary dataset output using the Self Describing Standard data discipline provided with the Integrated Scientific Tool Kit software tools. Finally we discuss the graphical interfaces to the lattice database. The primary interface, known as OZ, is a simulation environment as well as a database browser.

Trahern, C.G.; Zhou, J.

1991-11-01T23:59:59.000Z

340

MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)  

SciTech Connect (OSTI)

This annual report describes progress in the second year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is providing advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. Data is being assembled to analyze CO{sub 2} sequestration potential from a single object (e.g., power plant or well) to a region and across geographic boundaries. The MIDCARB system is robust and capable of being updated from multiple sources on a daily basis. The MIDCARB project has developed improved online tools to provide real-time display and analysis of CO{sub 2} sequestration data. The MIDCARB project is a functional template for distributed data systems to address CO{sub 2} sequestration and other natural resource issues that cross the boundaries between institutions and geographic areas. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

Timothy R. Carr; Scott W. White

2003-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

342

Buildings Performance Database | OpenEI  

Open Energy Info (EERE)

Buildings Performance Database Buildings Performance Database Dataset Summary Description This is a non-proprietary subset of DOE's Buildings Performance Database. Buildings from the cities of Dayton, OH and Gainesville, FL areas are provided as an example of the data in full database. Sample data here is formatted as CSV Source Department of Energy's Buildings Performance Database Date Released July 09th, 2012 (2 years ago) Date Updated Unknown Keywords Buildings Performance Database Dayton Electricity Gainesville Natural Gas open data Residential Data application/zip icon BPD Dayton and Gainesville Residential csv files in a zip file (zip, 2.8 MiB) text/csv icon BPD Dayton and Gainesville Residential Building Characteristics data (csv, 1.4 MiB) text/csv icon BPD Dayton and Gainesville Residential data headers (csv, 5.8 KiB)

343

Life Cycle Inventory Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Commercial Buildings » Research Projects » Life Cycle Inventory Commercial Buildings » Research Projects » Life Cycle Inventory Database Life Cycle Inventory Database The U.S. Life Cycle Inventory (LCI) Database serves as a central repository for information about the total energy and resource impacts of developing and using various commercial building materials, components, and assemblies. The database helps manufacturers, building designers, and developers select energy-efficient and environmentally friendly materials, products, and processes for their projects based on the environmental impact of an item over its entire lifespan. The U.S. Department of Energy and the National Renewable Energy Laboratory (NREL) developed the database in 2003 with input from a variety of partners. NREL maintains and updates the database with support from the

344

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

345

Reimplementing the EPICS static database access library.  

SciTech Connect (OSTI)

The Static Database Access library was first introduced in EPICS (Experimental Physics and Industrial Control System) Release 3.11 in 1994. It provides an application program interface (API) for database configuration tools written in C to manipulate database record definitions and is used for various tasks within the core EPICS software. This paper describes the structure of a replacement for the original library that adds a native C++ API and will make some future enhancements to EPICS significantly easier to implement.

Johnson, A. N.; Kraimer, M. R.

2001-11-13T23:59:59.000Z

346

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

347

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect (OSTI)

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

348

Transparent Cost Database | Open Energy Information  

Open Energy Info (EERE)

Transparent Cost Database Transparent Cost Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Transparent Cost Database Agency/Company /Organization: Department of Energy Partner: National Renewable Energy Laboratory Sector: Energy Focus Area: Renewable Energy, Solar, Transportation Topics: Baseline projection, Low emission development planning, -LEDS, Resource assessment, Technology characterizations Resource Type: Dataset, Lessons learned/best practices, Software/modeling tools User Interface: Website Web Application Link: en.openei.org/apps/TCDB/ Cost: Free OpenEI Keyword(s): Featured Equivalent URI: cleanenergysolutions.org/content/united-states-transparent-cost-databa Language: English The Transparent Cost Database collects program cost and performance

349

Buildings Performance Database Recommended Data Fields  

Broader source: Energy.gov [DOE]

Buildings Performance Database Recommended Data Fields, from the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy.

350

X-RAY MICROBEAM SPEECH PRODUCTION DATABASE  

E-Print Network [OSTI]

X-RAY MICROBEAM SPEECH PRODUCTION DATABASE USER'S HANDBOOK Version 1.0 (June 1994) prepared by John . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter Two: XRMB History

351

Lessons Learned Database | Department of Energy  

Energy Savers [EERE]

Lessons Learned Database Login Welcome to the Lessons Learned site, the premier Web tool for online information sharing regarding Lessons Learned issues. Please login to...

352

Dynameomics Database of Molecular Dynamics Simulations Project...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in determining protein behavior and function. Accomplishments: Over 11,000 protein folding simulations are now available in the world's largest public database of protein...

353

NAMA Database Wiki | Open Energy Information  

Open Energy Info (EERE)

be undertaken within the NAMA framework. The NAMA Database is an open platform for collaboration and knowledge-sharing. References Retrieved from "http:en.openei.orgw...

354

Environmental remediation and waste management information systems  

SciTech Connect (OSTI)

The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

Harrington, M.W.; Harlan, C.P.

1993-12-31T23:59:59.000Z

355

Energy Citations Database (ECD) - Help  

Office of Scientific and Technical Information (OSTI)

Help Help Alerts Basic Search Fielded Search - Sorting - Term searching - Author select - Subject select - Limit to - Date searching Search Tips - General - Case sensitivity - Drop-down menus - Report number searching - Wildcard operators - Phrase/adjacent term searching - Boolean Technical Requirements Search Results - Results - Using the check box - Bibliographic citations - View and download full text - Capture Citations Using Zotero - Download citations using EndNote ECD FAQs Alerts Help Alerts FAQs OSTI FAQs Alerts Alerts provide users with e-mail notification of updates to the Energy Citations Database in specific areas of interest. In order to receive Alerts, you must register. For assistance with Alerts, please see the Alerts Help and Alerts FAQ. Basic Search Enter your search term (s) in the search box and your search will be

356

ETD Management in the Texas Digital Library: lessons Learned from a Demonstrator  

E-Print Network [OSTI]

participants. Shiboleth Any web aplication that deals with personal information wil be dealing with authentication and identity management. In an educational seting, these aspects of the aplication are critical, and regulated by federal laws governing... is an open-source midleware aplication for providing identity management in a distributed environment (Shiboleth 208). In suport of its scholarly services, TDL established the first state-wide Shiboleth federation in Texas. Under this infrastructure, TDL...

Mikeal, Adam

2008-07-24T23:59:59.000Z

357

South Carolina Department of Archives and History Archives and Records Management Service Area  

E-Print Network [OSTI]

South Carolina Department of Archives and History Archives and Records Management Service Area 1919 ...................................................................................................................8 12-1109. Data/Database Dictionary Reports

Kasman, Alex

358

Federal Emergency Management Information system (FEMIS) data management guide. Version 1.2  

SciTech Connect (OSTI)

The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. The FEMIS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of FEMIS. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, how it is loaded, and how it is managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Johnson, S.M.; Loveall, R.M.; Winters, C.

1996-05-01T23:59:59.000Z

359

Glycan fragment database: a database of PDB-based glycan 3D structures  

E-Print Network [OSTI]

The glycan fragment database (GFDB), freely available at http://www.glycanstructure.org, is a database of the glycosidic torsion angles derived from the glycan structures in the Protein Data Bank (PDB). Analogous to protein ...

Jo, Sunhwan; Im, Wonpil

2012-10-25T23:59:59.000Z

360

NETL: News Release - Access to DOE Database of Oil and Natural Gas Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, 2011 2, 2011 Access to DOE Database of Oil and Natural Gas Research Results Expanded Washington, DC -The results of nearly four decades of research supported by the U.S. Department of Energy (DOE) are now available through the OnePetro online document repository. Click to link to the OnePetro website The OnePetro website now contains NETL's Oil & Gas Knowledge Management Database DOE's Knowledge Management Database (KMD) provides access to content from dozens of CDs and DVDs related to oil and natural gas research that the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) has published over the years. It also provides links to reports, data sets, and project summaries from ongoing research supported by FE's Oil and Natural Gas Program.

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Solid Waste Forecast Database: User`s guide (Version 1.5)  

SciTech Connect (OSTI)

The Solid Waste Forecast Database (SWFD) system is an analytical tool developed by Pacific Northwest Laboratory (PNL) for Westinghouse Hanford Company (WHC) specifically to address Hanford solid waste management issues. This document is one of a set of documents supporting the SWFD system and providing instructions in the use and maintenance of SWFD components. This manual contains instructions for using Version 1.5 of the SWFD, including system requirements and preparation, entering and maintaining data, and performing routine database functions. This document supports only those operations that are specific to SWFD menus and functions and does not provide instruction in the use of Paradox, the database management system in which the SWFD is established.

Bierschbach, M.C.

1994-05-01T23:59:59.000Z

362

Database Applications to Integrate Beam Line Optics Changes with the Engineering Databases  

SciTech Connect (OSTI)

The LCLS project databases provide key nomenclature information while integrating many engineering and physics processes in the building of an accelerator. Starting with the elements existing in the beam line optics files, the engineers add non-beam-line elements, and controls engineers assign ''Formal Device Names'' to these elements. Inventory, power supplies, racks, crates and cable plants are databases that are being integrated into the project database. This approach replaces individual spreadsheets and/or integrates standalone existing institutional databases.

Chan, A.; Bellomo, P.; Crane, G.R.; Emma, P.; Grunhaus, E.; Luchini, K.; MacGregor, I.A.; Marsh, D.S.; Pope, R.; Prickett, P.; Rago, C.; Ratcliffe, K.; Shab, T.; /SLAC

2007-07-06T23:59:59.000Z

363

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific  

E-Print Network [OSTI]

Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific information that has been gathered over 50 years of low-energy nuclear physics research worldwide. These powerful databases have enormous value and they represent a genuine national resource. Six core nuclear

Ohta, Shigemi

364

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

365

DATA QUALITY IN GENOME DATABASES (Research Paper)  

E-Print Network [OSTI]

DATA QUALITY IN GENOME DATABASES (Research Paper) Heiko MĂĽller Humboldt University Berlin, Germany@dbis.informatik.hu-berlin.de Abstract: Genome databases store data about molecular biological entities such as genes, proteins, diseases is their importance in the process of drug discovery. Genome data is analyzed and interpreted to gain so-called leads

Weske, Mathias

366

CALIFORNIA ENERGY Small HVAC Database Of Monitored  

E-Print Network [OSTI]

CALIFORNIA ENERGY COMMISSION Small HVAC Database Of Monitored Information Database of Compiled of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

367

Nama Database Wiki | Open Energy Information  

Open Energy Info (EERE)

Nama Database Wiki Nama Database Wiki Jump to: navigation, search Tool Summary LAUNCH TOOL Name: NAMA Database Wiki Agency/Company /Organization: Ecofys Sector: Climate, Energy Focus Area: Renewable Energy, Greenhouse Gas Phase: Evaluate Options, Develop Goals, Prepare a Plan Topics: Finance, Low emission development planning, -NAMA Resource Type: Guide/manual, Lessons learned/best practices, Training materials User Interface: Website Complexity/Ease of Use: Simple Website: www.nama-database.org/ The NAMA Database is an expanding resource containing the latest activities taking place around the world on Nationally Appropriate Mitigation Actions (NAMAs). The mission is to create a valuable resource for policy makers, researchers and other interested stakeholders to increase knowledge-sharing

368

Global Renewable Energy Database | Open Energy Information  

Open Energy Info (EERE)

Global Renewable Energy Database Global Renewable Energy Database Jump to: navigation, search Tool Summary Name: Global Renewable Energy Database Agency/Company /Organization: German Aerospace Center (DLR) Sector: Energy Focus Area: Renewable Energy, Solar, Wind Topics: Resource assessment Resource Type: Dataset, Maps Website: www.dlr.de/en/ References: DLR website [1] From 2009-2010 the German Aerospace Center (DLR) will inventory renewable energy resources for energy modeling in impact assessment models which will feed into a database of renewable energy resources in 0.45° spatial and 1h temporal resolution. References ↑ "DLR website" Retrieved from "http://en.openei.org/w/index.php?title=Global_Renewable_Energy_Database&oldid=328731" Category: Tools What links here

369

International Forest Policy Database | Open Energy Information  

Open Energy Info (EERE)

International Forest Policy Database International Forest Policy Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: International Forest Policy Database Agency/Company /Organization: GTZ Sector: Land Focus Area: Forestry Topics: Policies/deployment programs Resource Type: Dataset Website: www.etfrn.org/etfrn/topics/policy/index.html International Forest Policy Database Screenshot References: GTZ International Forest Policy Database[1] Overview "This topic page is being developed in cooperation with GTZ-IWP, the International Forest Policy project of the German organisation for international cooperation. GTZ-IWP has contributed considerably to the ETFRN NEWS 41/42 on national forest programmes. During this cooperation both GTZ and ETFRN identified a need for a central point of access to information on international forest

370

Proposal for a High Energy Nuclear Database  

E-Print Network [OSTI]

We propose to develop a high-energy heavy-ion experimental database and make it accessible to the scientific community through an on-line interface. This database will be searchable and cross-indexed with relevant publications, including published detector descriptions. Since this database will be a community resource, it requires the high-energy nuclear physics community's financial and manpower support. This database should eventually contain all published data from Bevalac, AGS and SPS to RHIC and LHC energies, proton-proton to nucleus-nucleus collisions as well as other relevant systems, and all measured observables. Such a database would have tremendous scientific payoff as it makes systematic studies easier and allows simpler benchmarking of theoretical models to a broad range of old and new experiments. Furthermore, there is a growing need for compilations of high-energy nuclear data for applications including stockpile stewardship, technology development for inertial confinement fusion and target and ...

Vogt, D A B R

2005-01-01T23:59:59.000Z

371

Design and Implementation of the CEBAF Element Database  

SciTech Connect (OSTI)

With inauguration of the CEBAF Element Database (CED) in Fall 2010, Jefferson Lab computer scientists have taken a first step toward the eventual goal of a model-driven accelerator. Once fully populated, the database will be the primary repository of information used for everything from generating lattice decks to booting front-end computers to building controls screens. A particular requirement influencing the CED design is that it must provide consistent access to not only present, but also future, and eventually past, configurations of the CEBAF accelerator. To accomplish this, an introspective database schema was designed that allows new elements, element types, and element properties to be defined on-the-fly without changing table structure. When used in conjunction with the Oracle Workspace Manager, it allows users to seamlessly query data from any time in the database history with the exact same tools as they use for querying the present configuration. Users can also check-out workspaces and use them as staging areas for upcoming machine configurations. All Access to the CED is through a well-documented API that is translated automatically from original C++ into native libraries for script languages such as perl, php, and TCL making access to the CED easy and ubiquitous. Notice: Authored by Jefferson Science Associates, LLC under U.S. DOE Contract No. DE-AC05-06OR23177. The U.S. Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce this manuscript for U.S. Government purposes.

Theodore Larrieu, Christopher Slominski, Michele Joyce

2011-10-01T23:59:59.000Z

372

Managing the History of Metadata in support for DB Archiving and Schema Evolution  

E-Print Network [OSTI]

evolution itself. We use the schema history of the Wikipedia database as a telling example of the many uses systems require a systematic archiving and management of the history of the database. In particular-time history archiving and querying of databases under schema evolution. The first objective is achieved

Zaniolo, Carlo

373

Management Information Systems (MIS) This sheet has sample occupations, work settings, employers, and career development activities associated with this major. Some of these  

E-Print Network [OSTI]

Manager Computer Training Specialist Consultant Database Engineer Database Manager/ Administrator Data for History & Computing - Plainview, TX www.theaahc.org American Society for Cybernetics - Washington, DC www.awc-hq.org For other related professional organizations, go to FSU Libraries database at lib.fsu.edu; select Find

Ronquist, Fredrik

374

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

375

National Spill Test Technology Database  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Western Research Institute established, and ACRC continues to maintain, the National Spill Technology database to provide support to the Liquified Gaseous Fuels Spill Test Facility (now called the National HAZMAT Spill Center) as directed by Congress in Section 118(n) of the Superfund Amendments and Reauthorization Act of 1986 (SARA). The Albany County Research Corporation (ACRC) was established to make publicly funded data developed from research projects available to benefit public safety. The founders since 1987 have been investigating the behavior of toxic chemicals that are deliberately or accidentally spilled, educating emergency response organizations, and maintaining funding to conduct the research at the DOEĆs HAZMAT Spill Center (HSC) located on the Nevada Test Site. ACRC also supports DOE in collaborative research and development efforts mandated by Congress in the Clean Air Act Amendments. The data files are results of spill tests conducted at various times by the Silicones Environmental Health and Safety Council (SEHSC) and DOE, ANSUL, Dow Chemical, the Center for Chemical Process Safety (CCPS) and DOE, Lawrence Livermore National Laboratory (LLNL), OSHA, and DOT; DuPont, and the Western Research Institute (WRI), Desert Research Institute (DRI), and EPA. Each test data page contains one executable file for each test in the test series as well as a file named DOC.EXE that contains information documenting the test series. These executable files are actually self-extracting zip files that, when executed, create one or more comma separated value (CSV) text files containing the actual test data or other test information.

Sheesley, David (Western Research Institute)

376

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

2: Symantec Endpoint Protection Manager Buffer Overflow 2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

377

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

82: Symantec Endpoint Protection Manager Buffer Overflow 82: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

378

The Impact of Electronic Bibliographic Databases and Electronic Journal Articles on the Scholar's Information-Seeking Behavior and Personal Collection of "Reprints"  

E-Print Network [OSTI]

This article examines the potential changes to the information seeking behavior of scholars and how they manage their own collection of research article “reprints”. With bibliographic databases and electronic journals provided by academic libraries...

McGeachin, Robert B.

2004-01-01T23:59:59.000Z

379

NREL: U.S. Life Cycle Inventory Database - About the LCI Database Project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

About the LCI Database Project About the LCI Database Project The U.S. Life Cycle Inventory (LCI) Database is a publicly available database that allows users to objectively review and compare analysis results that are based on similar data collection and analysis methods. Finding consistent and transparent LCI data for life cycle assessments (LCAs) is difficult. NREL works with LCA experts to solve this problem by providing a central source of critically reviewed LCI data through its LCI Database Project. NREL's High-Performance Buildings research group is working closely with government stakeholders, and industry partners to develop and maintain the database. The 2009 U.S. Life Cycle Inventory (LCI) Data Stakeholder meeting was an important step in the ongoing improvement of the database. Prior to that event, NREL conducted a poll of current and

380

Asynchronous data change notification between database server and accelerator controls system  

SciTech Connect (OSTI)

Database data change notification (DCN) is a commonly used feature. Not all database management systems (DBMS) provide an explicit DCN mechanism. Even for those DBMS's which support DCN (such as Oracle and MS SQL server), some server side and/or client side programming may be required to make the DCN system work. This makes the setup of DCN between database server and interested clients tedious and time consuming. In accelerator control systems, there are many well established software client/server architectures (such as CDEV, EPICS, and ADO) that can be used to implement data reflection servers that transfer data asynchronously to any client using the standard SET/GET API. This paper describes a method for using such a data reflection server to set up asynchronous DCN (ADCN) between a DBMS and clients. This method works well for all DBMS systems which provide database trigger functionality. Asynchronous data change notification (ADCN) between database server and clients can be realized by combining the use of a database trigger mechanism, which is supported by major DBMS systems, with server processes that use client/server software architectures that are familiar in the accelerator controls community (such as EPICS, CDEV or ADO). This approach makes the ADCN system easy to set up and integrate into an accelerator controls system. Several ADCN systems have been set up and used in the RHIC-AGS controls system.

Fu, W.; Morris, J.; Nemesure, S.

2011-10-10T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Renewable Energy and Defense Geospatial Database | Open Energy...  

Open Energy Info (EERE)

Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Renewable Energy and Defense Geospatial Database Abstract This database provides GIS data to...

382

High Performance Buildings Database | Open Energy Information  

Open Energy Info (EERE)

High Performance Buildings Database High Performance Buildings Database Jump to: navigation, search The High Performance Buildings Database (HPBD), developed by the United States Department of Energy and the National Renewable Energy Laboratory, is "a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad."[1] Map of HPBD entries Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":1000,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"-","intro":"","outro":"","searchlabel":"\u2026

383

Argonne TTRDC - D3 (Downloadable Dynamometer Database)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technology Analysis Transportation Research and Analysis Computing Center Working With Argonne Contact TTRDC Advanced Powertrain Research Facility - Downloadable Dynamometer Database (D3) aprf Advanced Powertrain Research Facility The Downloadable Dynamometer Database (D3) offers publicly available testing data regarding advanced technology vehicles. Derived from independent laboratory testing, the data is intended to enhance the understanding of advanced vehicle technologies for researchers, students, and professionals engaged in energy efficient vehicle research, development and education. Data from this website can only be used with the following attribution: "This data is from the Downloadable Dynamometer Database (http://www.transportation.anl.gov/D3/) and was generated at the Advanced

384

US Department of Energy Chernobyl Database  

SciTech Connect (OSTI)

The Chernobyl Database project is developing and maintaining an information to provide researchers with data and resource materials relating to the Chernobyl nuclear accident of April 1986. The system is the official United States repository for Chernobyl data. The system includes a collection of Chernobyl-related documents, a database of bibliographic references, and a collection of radiological measurements records. In addition, projects have been developed to make the resources more accessible and easy to use. These products include a personal-computer-based bibliographic search system (ChernoLit{trademark}), two printed bibliographies, and a personal- computer-based radiological measurements database system (ChernoDat).

Kennedy, R.A.; Mahaffey, J.A.; Smith, S.K.; Carr, F. Jr.

1992-05-01T23:59:59.000Z

385

A Database for Reviewing and Selecting Radioactive Waste Treatment Technologies and Vendors  

SciTech Connect (OSTI)

Several attempts have been made in past years to collate and present waste management technologies and solutions to waste generators. These efforts have been manifested as reports, buyers' guides, and databases. While this information is helpful at the time it is assembled, the principal weakness is maintaining the timeliness and accuracy of the information over time. In many cases, updates have to be published or developed as soon as the product is disseminated. The recently developed National Low-Level Waste Management Program's Technologies Database is a vendor-updated Internet based database designed to overcome this problem. The National Low-Level Waste Management Program's Technologies Database contains information about waste types, treatment technologies, and vendor information. Information is presented about waste types, typical treatments, and the vendors who provide those treatment methods. The vendors who provide services update their own contact information, their treatment processes, and the types of wastes for which their treatment process is applicable. This information is queriable by a generator of low-level or mixed low-level radioactive waste who is seeking information on waste treatment methods and the vendors who provide them. Timeliness of the information in the database is assured using time clocks and automated messaging to remind featured vendors to keep their information current. Failure to keep the entries current results in a vendor being warned and then ultimately dropped from the database. This assures that the user is dealing with the most current information available and the vendors who are active in reaching and serving their market.

P. C. Marushia; W. E. Schwinkendorf

1999-07-01T23:59:59.000Z

386

A Database for Reviewing and Selecting Radioactive Waste Treatment Technologies and Vendors  

SciTech Connect (OSTI)

Several attempts have been made in past years to collate and present waste management technologies and solutions to waste generators. These efforts have been manifested as reports, buyers’ guides, and databases. While this information is helpful at the time it is assembled, their principal weakness is maintaining the timeliness and accuracy of the information over time. In many cases, updates have to be published or developed as soon as the product is disseminated. The recently developed National Low-Level Waste Management Program’s Technologies Database is a vendor-updated Internet based database designed to overcome this problem. The National Low-Level Waste Management Program’s Technologies Database contains information about waste types, treatment technologies, and vendor information. Information is presented about waste types, typical treatments, and the vendors who provide those treatment methods. The vendors who provide services update their own contact information, their treatment processes, and the types of wastes for which their treatment process is applicable. This information is queriable by a generator of low-level or mixed low-level radioactive waste who is seeking information on waste treatment methods and the vendors who provide them. Timeliness of the information in the database is assured using time clocks and automated messaging to remind featured vendors to keep their information current. Failure to keep the entries current results in a vendor being warned and then ultimately dropped from the database. This assures that the user is dealing with the most current information available and the vendors who are active in reaching and serving their market.

Schwinkendorf, William Erich; Marushia, Patrick Charles

1999-07-01T23:59:59.000Z

387

Attributes for Causal Inference in Electronic Healthcare Databases Jenna Reps, Jonathan M. Garibaldi,  

E-Print Network [OSTI]

Attributes for Causal Inference in Electronic Healthcare Databases Jenna Reps, Jonathan M Spontaneous Reporting System (SRS) databases and Electronic Healthcare Databases (EHDs) are the databases

Aickelin, Uwe

388

Unsupervised Knowledge Discovery in Medical Databases Using Relevance Networks  

E-Print Network [OSTI]

Page 1 Unsupervised Knowledge Discovery in Medical Databases Using Relevance Networks Atul J Butte databases for unsupervised medical knowledge discovery without a prior model or information. Observations

Babu, M. Madan

389

The Tariff Analysis Project: A Database and Analysis Platform...  

Open Energy Info (EERE)

Tariff Analysis Project: A Database and Analysis Platform for Electricity Tariffs Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Tariff Analysis Project: A Database...

390

Standard Energy Efficiency Database Platform - 2013 BTO Peer...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Standard Energy Efficiency Database Platform - 2013 BTO Peer Review Standard Energy Efficiency Database Platform - 2013 BTO Peer Review commlbldgs09prindle040313.pdf More...

391

Fire Protection Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Fire Protection Database Fire Protection Database Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires the submission of an Annual Fire Protection Summary. The previous process used to collect the required data utilizes a Microsoft Access database that was downloaded, completed by the field and then sent to Headquarters for summation and analysis by engineers in Office of Sustainability Support. Data collection for the CY2013 Summary will begin Jan. 1, 2014, and a commitment has been made to the Defense Nuclear Facilities Safety Board to collect this information and make it available utilizing a standard systematic approach. This approach will be accomplished via a web based system which will allow reporting organizations to enter or edit information.

392

IPCC Emission Factor Database | Open Energy Information  

Open Energy Info (EERE)

IPCC Emission Factor Database IPCC Emission Factor Database Jump to: navigation, search Tool Summary Name: IPCC Emission Factor Database Agency/Company /Organization: World Meteorological Organization, United Nations Environment Programme Resource Type: Dataset Website: www.ipcc-nggip.iges.or.jp/EFDB/main.php References: IPCC-EFDB[1] About "EFDB is meant to be a recognised library, where users can find emission factors and other parameters with background documentation or technical references that can be used for estimating greenhouse gas emissions and removals. The responsibility of using this information appropriately will always remain with the users themselves." References ↑ "IPCC-EFDB" Retrieved from "http://en.openei.org/w/index.php?title=IPCC_Emission_Factor_Database&oldid=367213"

393

Buildings Performance Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Buildings » Buildings Performance Database Buildings » Buildings Performance Database Buildings Performance Database The Buildings Performance Database (BPD) unlocks the power of building energy performance data. The platform enables users to perform statistical analysis on an anonymous dataset of tens of thousands of commercial and residential buildings from across the country. Users can compare performance trends among similar buildings to identify and prioritize cost-saving energy efficiency improvements and assess the range of likely savings from these improvements. Access BPD Contact Us Key Features The BPD contains actual data on tens of thousands of existing buildings -- not modeled data or anecdotal evidence. The BPD enables statistical analysis without revealing information about individual buildings.

394

Version 2 Global Fire Emissions Database Available  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Fire Emissions Database Available Global Fire Emissions Database Available The ORNL DAAC announces the release of the data set "Global Fire Emissions Database, Version 2 (GFEDv2)." This data set, which supersedes and replaces the Global Fire Emissions Database, Version 1 (GFEDv1), consists of 1 degree x 1 degree gridded monthly burned area, fuel loads, combustion completeness, and fire emissions of carbon (C), carbon dioxide (CO2), carbon monoxide (CO), methane (CH4), non-methane hydrocarbons (NMHC), molecular hydrogen (H2), nitrogen oxides (NOx), nitrous oxide (N2O), particulate matter (PM2.5), total particulate matter (TPM), total carbon (TC), organic carbon (OC), and black carbon (BC) for the time period January 1997 - December 2004. For more information or to access this data set, please see the Vegetation

395

The Quebec Life Cycle Inventory Database Project  

Science Journals Connector (OSTI)

Life cycle assessment (LCA) in Quebec (Canada) is increasingly important. Yet, ... life cycle inventory (LCI) data. The Quebec government invested in the creation of a Quebec LCI database. The approach is to work...

Pascal Lesage; Réjean Samson

2013-05-01T23:59:59.000Z

396

ORNL Supplier Database- Stay in Touch!  

Broader source: Energy.gov [DOE]

Small business owners seeking to do business with the U.S. Department of Energy may already be aware of the Oak Ridge Supplier Database. The Small Business Programs Office at Oak Ridge National...

397

IFDB: Decentralized Information Flow Control for Databases  

E-Print Network [OSTI]

Numerous sensitive databases are breached every year due to bugs in applications. These applications typically handle data for many users, and consequently, they have access to large amounts of confidential information.

Schultz, David

398

6.893 Database Systems, Fall 2004  

E-Print Network [OSTI]

This course is designed to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, query optimization, query processing, and transactions. This ...

Madden, Samuel R. (Samuel Ross), 1976-

399

Energy Citations Database (ECD) - Alerts Comments  

Office of Scientific and Technical Information (OSTI)

Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

400

Geothermal/Geochemical Database | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Chart: GeothermalGeochemical DatabaseInfo GraphicMapChart Author Nevada Bureau of Mines and Geology Published...

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Proposal for a High Energy Nuclear Database  

E-Print Network [OSTI]

Proposal for a High Energy Nuclear Database David A. Brown 1it requires the high-energy nuclear physics com- munity’s ?compilations of high-energy nuclear data for applications

Brown, David A.; Vogt, Ramona

2005-01-01T23:59:59.000Z

402

Diffusion Databases for ICME | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ICME Diffusion Databases for ICME 2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer Evaluation lm036warren2011o.pdf More...

403

Towards Privacy Preserving of Forensic DNA Databases  

E-Print Network [OSTI]

Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

Liu, Sanmin

2012-02-14T23:59:59.000Z

404

An online climate database for Texas  

E-Print Network [OSTI]

AN ONLINE CLIMATE DATABASE FOR TEXAS A Thesis by MICHELE LYNN NORDEEN Submitted to the OAice of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 2000 Major Subject...: Atmospheric Sciences AN ONLINE CLIMATE DATABASE FOR TEXAS A Thesis by MICHELE LYNN NORDEEN Submitted to Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved as to style and content by: Kenneth R...

Nordeen, Michele Lynn

2012-06-07T23:59:59.000Z

405

Proposal for a High Energy Nuclear Database  

SciTech Connect (OSTI)

We propose to develop a high-energy heavy-ion experimental database and make it accessible to the scientific community through an on-line interface. This database will be searchable and cross-indexed with relevant publications, including published detector descriptions. Since this database will be a community resource, it requires the high-energy nuclear physics community's financial and manpower support. This database should eventually contain all published data from Bevalac and AGS to RHIC to CERN-LHC energies, proton-proton to nucleus-nucleus collisions as well as other relevant systems, and all measured observables. Such a database would have tremendous scientific payoff as it makes systematic studies easier and allows simpler benchmarking of theoretical models to a broad range of old and new experiments. Furthermore, there is a growing need for compilations of high-energy nuclear data for applications including stockpile stewardship, technology development for inertial confinement fusion and target and source development for upcoming facilities such as the Next Linear Collider. To enhance the utility of this database, we propose periodically performing evaluations of the data and summarizing the results in topical reviews.

Brown, David A.; Vogt, Ramona

2005-03-31T23:59:59.000Z

406

Concentrations of indoor pollutants database: User's manual  

SciTech Connect (OSTI)

This manual describes the computer-based database on indoor air pollutants. This comprehensive database alloys helps utility personnel perform rapid searches on literature related to indoor air pollutants. Besides general information, it provides guidance for finding specific information on concentrations of indoor air pollutants. The manual includes information on installing and using the database as well as a tutorial to assist the user in becoming familiar with the procedures involved in doing bibliographic and summary section searches. The manual demonstrates how to search for information by going through a series of questions that provide search parameters such as pollutants type, year, building type, keywords (from a specific list), country, geographic region, author's last name, and title. As more and more parameters are specified, the list of references found in the data search becomes smaller and more specific to the user's needs. Appendixes list types of information that can be input into the database when making a request. The CIP database allows individual utilities to obtain information on indoor air quality based on building types and other factors in their own service territory. This information is useful for utilities with concerns about indoor air quality and the control of indoor air pollutants. The CIP database itself is distributed by the Electric Power Software Center and runs on IBM PC-compatible computers.

Not Available

1992-05-01T23:59:59.000Z

407

Development of the downhole dynamometer database  

SciTech Connect (OSTI)

The Downhole Dynamometer Database is a compilation of test data collected with a set of five downhole tools built by Albert Engineering under contract to Sandia National Laboratories. The downhole dynamometer tools are memory tools deployed in the sucker rod string with sensors to measure pressure, temperature, load, and acceleration. The acceleration data is processed to yield position, so that a load vs. position dynagraph can be generated using data collected downhole. With five tools in the hole at one time, all measured data and computed dynagraphs from five different positions in the rod string are available. The purpose of the Database is to provide industry with a complete and high quality measurement of downhole sucker rod pumping dynamics. To facilitate use of the database, Sandia has developed a Microsoft Windows-based interface that functions as a visualizer and browser to the more than 40 MBytes of data. The interface also includes a data export feature to allow users to extract data from the database for use in their own programs. This paper includes a description of the downhole dynamometer tools, data collection program, database content, and a few illustrations of the data contained in the downhole dynamometer database.

Waggoner, J.R.; Mansure, A.

1997-02-01T23:59:59.000Z

408

Energy Savings Through Steam Trap Management  

E-Print Network [OSTI]

Energy Savings through Steam Trap Management Chris Gibbs, Account Manager, Armstrong International, Inc., Three Rivers, MI ESL-IE-08-05-08 Proceedings from theThirtieth Industrial Energy Technology Conference...-based steam trap management application developed by Armstrong International. The application calculates steam loss, fuel loss, dollar loss and CO 2 emission generation. The database allows for trend analysis, automatic energy report generation...

Gibbs, C.

2008-01-01T23:59:59.000Z

409

Safety & Emergency Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

F.A.Q.s F.A.Q.s Conference Center and APS Site Activity Coordination Management and/or Coordination of APS Site Work/Services Safety & Emergency Management Database Maintenance Personnel Safety & Emergency Management Area Emergency Supervision Drills/Training Page Bob Whitman with any questions or concerns. Area Emergency Supervisors and Building Monitors in your location can be found online. ESH 108 Building Orientation Page Bob Whitman with any questions regarding the newly designed ESH 108 Building Orientation course. Fire Alarm System Testing Through Argonne Fire Protection Services, the fire alarm system is tested visually and audibly annually. Life Safety Inspections Page Carl Nelson at 4-1892 with any questions. Life Safety Inspections are collected by Carl via fax at 2-9729 or delivery to office B0149

410

Offshore wind metadata management  

Science Journals Connector (OSTI)

Offshore wind energy is gaining more and more attention from industry and research community due to its high potential in producing green energy and lowering price on electricity consumption. However, offshore wind is facing many challenges, and hence it is still expensive to install in large scale. It therefore needs to be considered from different aspects of technologies in order to overcome these challenges. One of the problems of the offshore wind is that information comes from different sources with diversity in types and format. Besides, there are existing wind databases that should be utilised in order to enrich the knowledge base of the wind domain. This paper describes an approach to managing offshore wind metadata effectively using semantic technologies. An offshore wind ontology has been developed. The semantic gap between the developed ontology and the relational database is investigated. A prototype system has been developed to demonstrate the use of the ontology.

Trinh Hoang Nguyen; Rocky Dunlap; Leo Mark; Andreas Prinz; Bjørn Mo �stgren; Trond Friisø

2014-01-01T23:59:59.000Z

411

NETL: Ambient Monitoring - Air Quality Database and Analytical Tool  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Database and Analytical Tool for Air Quality in the Upper Ohio River Valley Database and Analytical Tool for Air Quality in the Upper Ohio River Valley Advanced Technology Systems, Inc. with Ohio University and Texas A&M University - Kingsville as subcontractors, will develop a state-of-the-art, scalable and robust computer application for NETL to manage the extensive data sets resulting from the DOE-sponsored ambient air monitoring programs in the upper Ohio River valley region. Efforts will be made to include, to the greatest extent possible, ambient air data collected by other agencies in the upper Ohio River valley region, such as U.S. EPA, Pennsylvania Department of Environmental Protection (PA-DEP), West Virginia Division of Environmental Protection (WV-DEP), Ohio EPA, and the Allegheny County Health Department (ACHD). Although emphasis will be placed on data collected in the upper Ohio River valley region, the computer application developed under this Agreement will be designed, to the greatest extent possible, to access data collected at NETL-sponsored ambient air monitoring sites outside the region, such as sites operated by the Tennessee Valley Authority in the Great Smoky Mountains (under DOE Interagency Agreement DE-AI26-98FT40406) and by Southern Research Institute in North Birmingham, AL (under DOE Cooperative Agreement DE-FC26-00NT40770). The data base and analytical tool development effort will also be coordinated, to the greatest extent possible, with similar tools being developed for use by U.S. EPA. This will ensure that the database and analytical tools produced under this Agreement will be readily accessible to a wide variety of stakeholders.

412

A schema for protecting the integrity of databases  

Science Journals Connector (OSTI)

Unauthorized changes to databases can result in significant losses for organizations as well as individuals. Watermarking can be used to protect the integrity of databases against unauthorized alterations. Prior work focused on watermarking database ... Keywords: Data integrity, Database, Multidimensional indexing, Spatial indexing, Watermarking

Ibrahim Kamel

2009-10-01T23:59:59.000Z

413

Triggers on Database Histories A. Prasad Sistla Ouri Wolfson  

E-Print Network [OSTI]

Triggers on Database Histories A. Prasad Sistla Ouri Wolfson Department of Electrical Engineering of the database state over time (i.e. the database history). For example, in securities trading, the system may to the database history. The following temporal trigger is one such example--- the value of attribute A increases

Wolfson, Ouri E.

414

Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

Overall Structure History of Database Systems #12;©Silberschatz, Korth and Sudarshan1.3Database SystemDatabase System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www, Korth and Sudarshan1.2Database System Concepts - 5th Edition, May 23, 2005 Chapter 1: Introduction

Dragan, Feodor F.

415

Implementing an Improved Security for XYZ's Database and Telecommuters  

E-Print Network [OSTI]

& Integrity of XYZ’s Database……………………………............17 Developing a Database Security Plan ……………………………...............................18 Implementing the Improved Security... can occur. Developing a Database Security Plan XYZ has installed several audit trail devices into their working database system. Some of these devices are Top Secret and CA-Unicenter or other Windows security tools. These tools are able...

Ali, Mohamed M.

2011-05-20T23:59:59.000Z

416

Configuration management program plan for Hanford site systems engineering  

SciTech Connect (OSTI)

This plan establishes the integrated configuration management program for the evolving technical baseline developed through the systems engineering process. This configuration management program aligns with the criteria identified in the DOE Standard, DOE-STD-1073-93. Included are specific requirements for control of the systems engineering RDD-100 database, and electronic data incorporated in the database that establishes the Hanford site technical baseline.

Hoffman, A.G.

1994-11-14T23:59:59.000Z

417

SERN Policy and Regulation Database | Open Energy Information  

Open Energy Info (EERE)

SERN Policy and Regulation Database SERN Policy and Regulation Database Jump to: navigation, search Tool Summary Name: SERN Policy and Regulation Database Agency/Company /Organization: Renewable Energy and Energy Efficiency Partnership Sector: Energy Focus Area: Energy Efficiency, Renewable Energy Topics: Policies/deployment programs, Background analysis Resource Type: Dataset References: REEEP SERN Policy and Regulation Database[1] "The SERN Policy database will allow project developers to understand the existing energy mix within a country and the regulatory barriers which they may have to overcome in implementing a renewable energy and/or energy efficiency project. The policy database is available online." References ↑ "REEEP SERN Policy and Regulation Database"

418

IEA Policies and Measures Database | Open Energy Information  

Open Energy Info (EERE)

IEA Policies and Measures Database IEA Policies and Measures Database Jump to: navigation, search Tool Summary Name: IEA Policies and Measures Database Agency/Company /Organization: International Energy Agency Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, Climate Change Topics: Policies/deployment programs, Background analysis Resource Type: Dataset Website: www.iea.org/policiesandmeasures/ References: IEA Policies and Measures Database[1] The IEA Policies and Measures Database (often referred to as "PAMs") contains 3 sub-databases storing data for renewable energy, energy efficiency and climate change areas. Database provides information on governmental policies, strategies and programmes supporting deployment of renewable energy technologies, striving to increase energy efficiency and combat climate change.

419

Building Technologies Office: Buildings Performance Database Analysis Tools  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Buildings Performance Buildings Performance Database Analysis Tools to someone by E-mail Share Building Technologies Office: Buildings Performance Database Analysis Tools on Facebook Tweet about Building Technologies Office: Buildings Performance Database Analysis Tools on Twitter Bookmark Building Technologies Office: Buildings Performance Database Analysis Tools on Google Bookmark Building Technologies Office: Buildings Performance Database Analysis Tools on Delicious Rank Building Technologies Office: Buildings Performance Database Analysis Tools on Digg Find More places to share Building Technologies Office: Buildings Performance Database Analysis Tools on AddThis.com... About Take Action to Save Energy Activities 179d Tax Calculator Advanced Energy Design Guides Advanced Energy Retrofit Guides

420

NREL-LCI Database Project | Open Energy Information  

Open Energy Info (EERE)

LCI Database Project LCI Database Project Jump to: navigation, search Logo: NREL-LCI Database Project Name NREL-LCI Database Project Agency/Company /Organization National Renewable Energy Laboratory Sector Energy Focus Area Buildings Resource Type Dataset Website http://www.nrel.gov/lci/ Program Start 2001 Country United States Northern America References About LCI Database Project[1] Abstract The U.S. Life Cycle Inventory (LCI) Database is a publicly available database that allows users to objectively review and compare analysis results that are based on similar data collection and analysis methods. NREL-LCI Database Project Screenshot This article is a stub. You can help OpenEI by expanding it. References ↑ "About LCI Database Project" Retrieved from "http://en.openei.org/w/index.php?title=NREL-LCI_Database_Project&oldid=408164"

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Mining Software Usage with the Automatic Library Tracking Database (ALTD)  

SciTech Connect (OSTI)

Tracking software usage is important for HPC centers, computer vendors, code developers and funding agencies to provide more efficient and targeted software support, and to forecast needs and guide HPC software effort towards the Exascale era. However, accurately tracking software usage on HPC systems has been a challenging task. In this paper, we present a tool called Automatic Library Tracking Database (ALTD) that has been developed and put in production on several Cray systems. The ALTD infrastructure prototype automatically and transparently stores information about libraries linked into an application at compilation time and also the executables launched in a batch job. We will illustrate the usage of libraries, compilers and third party software applications on a system managed by the National Institute for Computational Sciences.

Hadri, Bilel [ORNL; Fahey, Mark R [ORNL

2013-01-01T23:59:59.000Z

422

LM FIMS Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

FIMS Database FIMS Database LM FIMS Database January 8, 2013 - 1:06pm Addthis A road is improved at the Grand Junction, Colorado, Disposal Site. A road is improved at the Grand Junction, Colorado, Disposal Site. A building is demolished at the Weldon Spring, Missouri, Site. A building is demolished at the Weldon Spring, Missouri, Site. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building. A road is improved at the Grand Junction, Colorado, Disposal Site. A building is demolished at the Weldon Spring, Missouri, Site. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building.

423

National Solar Radiation Database | Open Energy Information  

Open Energy Info (EERE)

National Solar Radiation Database National Solar Radiation Database Jump to: navigation, search The National Solar Radiation Database, or NSRDB, describes the amount of solar energy which is available at any location in the United States. It is generated by the National Renewable Energy Laboratory, with the assistance of many collaborators.[1] Technical Overview Per its user's manual, "The NSRDB is a serially complete collection of hourly values of the three most common measurements of solar radiation (global horizontal, direct normal, and diffuse horizontal) over a period of time adequate to establish means and extremes, and at a sufficient number of locations to represent regional solar radiation climates."[2] There have been two releases of the NSRDB, each covering different time

424

LM FIMS Database | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

LM FIMS Database LM FIMS Database LM FIMS Database January 8, 2013 - 1:06pm Addthis A road is improved at the Grand Junction, Colorado, Disposal Site. A road is improved at the Grand Junction, Colorado, Disposal Site. A building is demolished at the Weldon Spring, Missouri, Site. A building is demolished at the Weldon Spring, Missouri, Site. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building. A road is improved at the Grand Junction, Colorado, Disposal Site. A building is demolished at the Weldon Spring, Missouri, Site. An innovative cool roof installation increased energy efficiency at the Fernald Preserve, Ohio, offsite administrative building.

425

USGS Energy Geochemistry Database | OpenEI  

Open Energy Info (EERE)

Energy Geochemistry Database Energy Geochemistry Database Dataset Summary Description The Energy Geochemistry Data Base (EGDB) contains chemical analysis data for crude oil, natural gas, coal, water, and rock samples analyzed by the USGS Energy Resources Team's Geochemistry Laboratory, or by contracted-service laboratories. Data was also obtained from the literature and unpublished public domain sources. The sample types included are primarily rock, coal, oil, and gas. Analytical data within the EGDB includes Rock-Eval pyrolysis, organic mass spectrometry, vitrinite reflectance, gas chromatography, stable carbon isotopes, inductively coupled plasma, inductively coupled plasma mass spectrometry, mercury analysis and a number of other related geochemistry analyses that, in some instances, predate the EGDB. The database is in a Microsoft Access format (.mdb).

426

Fact Sheet: Energy Storage Database (October 2012)  

Broader source: Energy.gov (indexed) [DOE]

Sandia National Laboratories Sandia National Laboratories List of projects, including technology details and status Interactive map of search result project locations Multiple sort options (e.g., state, type, size) to ease navigation Energy storage projects and policies across the United States are rapidly evolving and expanding. A publicly accessible central archive is increasingly essential to document these developments; to facilitate future projects; and to ease cross-sector, national, and international coordination. The U.S. Department of Energy (DOE) and Sandia National Laboratories contracted Strategen Consulting LLC to develop a database of energy storage projects and policies. When completed, the database will present current information about energy storage projects worldwide and U.S. energy storage policy in an easy-to-use and intuitive format. The database will be research-grade, unbiased,

427

Renewable Energy Development: Databases, Tools, and Analyses  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Renewable Energy Development: Databases, Tools, and Analyses Renewable Energy Development: Databases, Tools, and Analyses For over 20 years, EVS has used geospatial databases and technologies for environmental analysis of energy technologies and programs, with a focus on renewable energy. EVS has developed extensive geospatial libraries of energy and environmental data to support our work, partnered with a multi-disciplinary team of scientists and engineers to analyze impacts of potential projects and programs, created models to simulate energy and environmental processes, and produced web-based and desktop tools to help stakeholders understand issues and participate in decision making. The geographic context of energy and environmental issues is so fundamental to decision making that many of our projects routinely involve geospatial

428

The AGN Black Hole Mass Database  

E-Print Network [OSTI]

The AGN Black Hole Mass Database is a compilation of all published spectroscopic reverberation-mapping studies of active galaxies. We have created a public web interface, where users may get the most up-to-date black hole masses from reverberation mapping for any particular active galactic nucleus (AGN), as well as obtain the individual measurements upon which the masses are based and the appropriate references. While the database currently focuses on the measurements necessary for black hole mass determinations, we also plan to expand it in the future to include additional useful information, such as host-galaxy characteristics. New reverberation mapping results will also be incorporated into the database as they are published in peer-refereed journals.

Bentz, Misty C

2014-01-01T23:59:59.000Z

429

Transmission/Nepa Database | Open Energy Information  

Open Energy Info (EERE)

Nepa Database Nepa Database < Transmission Jump to: navigation, search NepaHeader.png Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah Washington Wyoming Resource Library NEPA Database Document Collections (1) Have a NEPA Document Collection to add that doesn't yet exist in this collection? Make sure it doesn't already exist: Please be sure to search this page by serial number and by document number Add.png Add a new NEPA Document Collection This query has been included to allow you to use the black arrows in the table header cells to sort the table data. Document Name Serial Number Analysis Type Transmission Type Project Area Applicant Lead Agency District Office Project Phase(s) TransWest EIS 600kV Wyoming Western Power Administration BLM BLM Wyoming State Office

430

The JANA Calibrations and Conditions Database API  

SciTech Connect (OSTI)

Calibrations and conditions databases can be accessed from within the JANA Event Processing framework through the API defined in its JCalibration base class. The API is designed to support everything from databases, to web services to flat files for the backend. A Web Service backend using the gSOAP toolkit has been implemented which is particularly interesting since it addresses many modern cybersecurity issues including support for SSL. The API allows constants to be retrieved through a single line of C++ code with most of the context, including the transport mechanism, being implied by the run currently being analyzed and the environment relieving developers from implementing such details.

David Lawrence

2010-07-01T23:59:59.000Z

431

Poster sessions as an authentic assessment approach in an open-Ended University general chemistry laboratory  

Science Journals Connector (OSTI)

The purpose of this study is to explore the views of Pre-service Science Teachers (PSTs) on their posters as an authentic assessment tool in an open-ended chemistry laboratory course. Forty-three \\{PSTs\\} set up their research questions, designed and performed laboratory investigations, obtained results of their experiments and prepared their posters as an alternative to traditional laboratory reports. They engaged in the process of assessment in the course as both self and peer evaluators. At the end of each laboratory session, each group of the \\{PSTs\\} presented posters of their laboratory investigations to their peers and instructors. Results of the PSTs’ interview analyses indicated that most \\{PSTs\\} expressed many benefits to the presentation of laboratory investigations using posters in comparison to the traditional laboratory reports.

Alev Do?an; Osman Naf?z Kaya

2009-01-01T23:59:59.000Z

432

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network [OSTI]

Biometric authentication is a process of verifying an identity claim using a person’s behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

433

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network [OSTI]

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a person’s behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAP–RR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

434

Learning a semantic database from unstructured text  

E-Print Network [OSTI]

In this paper, we aim to learn a semantic database given a text corpus. Specifically, we focus on predicting whether or not a pair of entities are related by the hypernym relation, also known as the 'is-a' or 'type-of' ...

Dhandhania, Keshav

2014-01-01T23:59:59.000Z

435

Database System Concepts Silberschatz, Korth and Sudarshan  

E-Print Network [OSTI]

: Application Design and Development User Interfaces and Tools Web Interfaces to Databases Web Fundamentals Servlets and JSP Building Large Web Applications Triggers Authorization in SQL Application Security #12 user interfaces Report generators Data analysis tools (see Chapter 18) Many interfaces are Web

Dragan, Feodor F.

436

Constructing ontology-driven protein family databases  

Science Journals Connector (OSTI)

......Figure 1 shows the database schema high-lighting terms from the underlying ontology. As...updates and maintenance greatly outweigh the costs of performing ontology revisions. Using...ACKNOWLEDGEMENTS We would like to thank the Medical Research Council, UK, for funding this......

K. Wolstencroft; R. McEntire; R. Stevens; L. Tabernero; A. Brass

2005-04-01T23:59:59.000Z

437

Hypercat : A Database for extragalactic astronomy  

E-Print Network [OSTI]

The Hypercat Database is developed at Observatoire de Lyon and is distributed on the WEB through different mirrors in Europe. The goal of Hypercat is to gather data necessary for studying the evolution of galaxies (dynamics and stellar contains) and particularly for providing a z=0 reference for these studies.

Ph. Prugniel; G. Maubon

1999-09-29T23:59:59.000Z

438

Impact of Semantic Heterogeneity on Federating Databases  

Science Journals Connector (OSTI)

......B. (1994) Fundamentals of Database Systems, 2nd edn. Benjamin Cummings, New York. [19] Salton, G. (1989) Automatic...Hutchinson, E. K., Kalmus, J. R., MacKinnon, L. M., Jeffery, K. G., Marwick, D. H., Williams, M. H. and Wilson......

R. M. Colomb

1997-01-01T23:59:59.000Z

439

World Gasification Database Now Available from DOE  

Broader source: Energy.gov [DOE]

A database just released by the U.S. Department of Energy documents the worldwide growth of gasification, the expected technology of choice for future coal-based plants that produce power, fuels, and/or chemicals with near-zero emissions.

440

Auditing a database under retention policies  

Science Journals Connector (OSTI)

Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is an historical record of the past that can also pose a serious threat to privacy. ... Keywords: Auditing, Privacy, Retention policy

Wentian Lu; Gerome Miklau; Neil Immerman

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, A.J. Stell, D. Martin, G. Stewart  

E-Print Network [OSTI]

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, UK j.watt@nesc.gla.ac.uk Abstract The Grid and Web service community are defining a range of stan

Glasgow, University of

442

NETL: Carbon Storage - NETL Carbon Capture and Storage Database  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CCS Database CCS Database Carbon Storage NETL's Carbon Capture, Utilization, and Storage Database - Version 4 Welcome to NETL's Carbon Capture, Utilization, and Storage (CCUS) Database. The database includes active, proposed, canceled, and terminated CCUS projects worldwide. Information in the database regarding technologies being developed for capture, evaluation of sites for carbon dioxide (CO2) storage, estimation of project costs, and anticipated dates of completion is sourced from publically available information. The CCUS Database provides the public with information regarding efforts by various industries, public groups, and governments towards development and eventual deployment of CCUS technology. As of November 2012, the database contained 268 CCUS projects worldwide. The 268 projects include 68 capture, 61 storage, and 139 for capture and storage in more than 30 countries across 6 continents. While most of the projects are still in the planning and development stage, or have recently been proposed, 37 are actively capturing and injecting CO2

443

UK Windspeed Reference/Archival Database | OpenEI  

Open Energy Info (EERE)

Windspeed Reference/Archival Database Windspeed Reference/Archival Database Dataset Summary Description The windspeed database provides estimates of mean annual wind speed throughout the UK, averaged over a 1-kilometer square area, at each of the following three heights above ground level (agl): 10 meters, 25 meters, and 45 meters. The windspeed database is available through the UK Department of Energy and Climate Change (DECC) website, and is provided for archive purposes only. The database is comprised of historic information, including results derived from mathematical models, so it should not be considered to be measured data, or up to date or accurate. The database was originally developed by the UK Department of Trade and Industry (DTI) at some point before 2001. The data used to develop the database dates from the period approximately between the mid-1970s to the mid-1980s. Results derived from the UK windspeed database should be treated as approximate and high-level.

444

Query-based database policy assurance using semantic web technologies  

E-Print Network [OSTI]

In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

Soltren, José Hiram

2009-01-01T23:59:59.000Z

445

Brillouin-zone database on the Bilbao Crystallographic Server  

Science Journals Connector (OSTI)

The Brillouin-zone database of the Bilbao Crystallographic Server (http://www.cryst.ehu.es ) is presented. Recent improvements and modifications of the database are discussed and illustrated by several examples.

Aroyo, M.I.

2014-02-12T23:59:59.000Z

446

Novel applications of data mining methodologies to incident databases  

E-Print Network [OSTI]

Incident databases provide an excellent opportunity to study the repeated situations of incidents in the process industry. The databases give an insight into the situation which led to an incident, and if studied properly can help monitor...

Anand, Sumit

2006-08-16T23:59:59.000Z

447

NOAA Atlas NESDIS 72 WORLD OCEAN DATABASE 2013  

E-Print Network [OSTI]

NOAA Atlas NESDIS 72 WORLD OCEAN DATABASE 2013 Timothy P. Boyer, John I. Antonov, Olga K. Baranova, World Ocean Database 2013. Sydney Levitus, Ed.; Alexey Mishonov, Technical Ed.; NOAA Atlas NESDIS 72........................................................................................................... 14 1.1.1. History

448

Human sciences The human sciences database contains approximately 254 academic  

E-Print Network [OSTI]

Human sciences The human sciences database contains approximately 254 academic journals and statistical reports on the following subjects: (comparative literature, theology, history and geography, education, psychology, arts, languages and Library Science) Social sciences The social sciences database

449

Fear and desire in systems design : negotiating database usefulness  

E-Print Network [OSTI]

Databases are ubiquitous. They are used for a host of functions including coordination, decision making, and memory archiving. Despite their importance and ubiquity, databases continue to frustrate us, often departing from ...

Agrawal, Tanu

2008-01-01T23:59:59.000Z

450

Updating and Querying Databases that Track Mobile Units  

Science Journals Connector (OSTI)

In this paper, we consider databases representing information about moving objects (e.g., vehicles), particularly their location. We address the problems of updating and querying such databases. Specifically, the update problem is to determine when the ...

Ouri Wolfson; A. Prasad Sistla; Sam Chamberlain; Yelena Yesha

1999-07-01T23:59:59.000Z

451

Nuclear materials management storage study  

SciTech Connect (OSTI)

The Office of Weapons and Materials Planning (DP-27) requested the Planning Support Group (PSG) at the Savannah River Site to help coordinate a Departmental complex-wide nuclear materials storage study. This study will support the development of management strategies and plans until Defense Programs` Complex 21 is operational by DOE organizations that have direct interest/concerns about or responsibilities for nuclear material storage. They include the Materials Planning Division (DP-273) of DP-27, the Office of the Deputy Assistant Secretary for Facilities (DP-60), the Office of Weapons Complex Reconfiguration (DP-40), and other program areas, including Environmental Restoration and Waste Management (EM). To facilitate data collection, a questionnaire was developed and issued to nuclear materials custodian sites soliciting information on nuclear materials characteristics, storage plans, issues, etc. Sites were asked to functionally group materials identified in DOE Order 5660.1A (Management of Nuclear Materials) based on common physical and chemical characteristics and common material management strategies and to relate these groupings to Nuclear Materials Management Safeguards and Security (NMMSS) records. A database was constructed using 843 storage records from 70 responding sites. The database and an initial report summarizing storage issues were issued to participating Field Offices and DP-27 for comment. This report presents the background for the Storage Study and an initial, unclassified summary of storage issues and concerns identified by the sites.

Becker, G.W. Jr.

1994-02-01T23:59:59.000Z

452

The Marshall Islands Data Management Program  

SciTech Connect (OSTI)

This report is a resource document of the methods and procedures used currently in the Data Management Program of the Marshall Islands Dose Assessment and Radioecology Project. Since 1973, over 60,000 environmental samples have been collected. Our program includes relational database design, programming and maintenance; sample and information management; sample tracking; quality control; and data entry, evaluation and reduction. The usefulness of scientific databases involves careful planning in order to fulfill the requirements of any large research program. Compilation of scientific results requires consolidation of information from several databases, and incorporation of new information as it is generated. The success in combining and organizing all radionuclide analysis, sample information and statistical results into a readily accessible form, is critical to our project.

Stoker, A.C.; Conrado, C.L.

1995-09-01T23:59:59.000Z

453

U.S. Life Cycle Inventory Database Roadmap (Brochure)  

Broader source: Energy.gov (indexed) [DOE]

LIFE CYCLE INVENTORY DATABASE LIFE CYCLE INVENTORY DATABASE ROADMAP rsed e Goals of the U.S. LCI Database Project * Maintain data quality and transparency. * Cover commonly used materials, products, and processes in the United States with up-to-date, critically reviewed LCI data. * Support the expanded use of LCA as an environmental decision-making tool. * Maintain compatibility with international LCI databases. * Provide exceptional data accessibility.

454

Frequently Asked Questions About the Building Performance Database  

Broader source: Energy.gov [DOE]

On this page you will find answers to frequently asked questions pertaining to the DOE Buildings Performance Database (BPD).

455

NEPA Database | OpenEI Community  

Open Energy Info (EERE)

NEPA Database NEPA Database Home > Groups > Geothermal Regulatory Roadmap Kyoung's picture Submitted by Kyoung(155) Contributor 25 February, 2013 - 10:19 data NEPA quarterly meeting We are in the process of working with federal agencies (DOE, BLM, USFS) and their local offices to collect detailed information about Geothermal NEPA documents, including applications that triggered the documents, relevant dates, agencies, stipulations, conditions and mitigation measures. The collection of these data will allow us to analyze (with real data) NEPA timelines and processes. These data will be posted on OpenEI after they are collected. We plan to present the preliminary results of this work at our next quarterly meeting in April for public feedback and comment. Groups: Geothermal Regulatory Roadmap

456

Hydrodynamic Testing Facilities Database | Open Energy Information  

Open Energy Info (EERE)

Hydrodynamic Testing Facilities Database Hydrodynamic Testing Facilities Database (Redirected from Hydrodynamic Testing Facilities) Jump to: navigation, search Facility Operators By viewing Hydrodynamic Testing Facilities in the list accompanying the map, one will be provided with data on a range of test capabilities and services available at commercial, academic, and government facilities and offshore berths within the United States. Click on a thumbnail in the adjacent map in order to view a testing facility operator's profile page. This page will include in depth information about the testing facilities that each operator oversees. Click on this link, CSV ,to download all of the information on all hydrodynamic testing facilities. Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":5000,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026

457

DOE Research and Development Accomplishments Database Browse  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Database Browse Database Browse The ASTRAL Compendium in 2004; Chandonia, John-Marc; Hon, Gary; Walker, Nigel S.; Lo Conte, Loredana; Koehl, Patrice; Levitt, Michael; Brenner, Steven E.; September 15, 2003; LBNL--53820; ACC0491 322 K, 10 pp. View Document A Novel Method for Sampling Alpha-Helical Protein Backbones; Fain, Boris; Levitt, Michael; 2001; ; ACC0490 1223 K, 28 pp. View Document Chemical Research--Radiochemistry Report for Month Ending April 17, 1943; Franck, J. Division Director; 1952; CC-579; ACC0484 13567 K, 21 pp. View Document Theoretical Studies in Chemical Kinetics - Annual Report, 1970.; Karplus, Martin; October 1970; HUX--3780-33; ACC0483 544 K, 7 pp. View Document Nonequilibrium Contribution to the Rate of Reaction. III. Isothermal Multicomponent Systems; Shizgal, B.; Karplus, M.; October 1970; HUX--3780-31; ACC0482

458

Hydrodynamic Testing Facilities Database | Open Energy Information  

Open Energy Info (EERE)

Hydrodynamic Testing Facilities Database Hydrodynamic Testing Facilities Database Jump to: navigation, search Facility Operators By viewing Hydrodynamic Testing Facilities in the list accompanying the map, one will be provided with data on a range of test capabilities and services available at commercial, academic, and government facilities and offshore berths within the United States. Click on a thumbnail in the adjacent map in order to view a testing facility operator's profile page. This page will include in depth information about the testing facilities that each operator oversees. Click on this link, CSV ,to download all of the information on all hydrodynamic testing facilities. Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":5000,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026

459

Wisconsin Inventors' Network Database final report  

SciTech Connect (OSTI)

The Wisconsin Innovation Service Center at UW-Whitewater received a DOE grant to create an Inventor's Network Database to assist independent inventors and entrepreneurs with new product development. Since 1980, the Wisconsin Innovation Service Center (WISC) at the University of Wisconsin-Whitewater has assisted independent and small business inventors in estimating the marketability of their new product ideas and inventions. The purpose of the WISC as an economic development entity is to encourage inventors who appear to have commercially viable inventions, based on preliminary market research, to invest in the next stages of development, perhaps investigating prototype development, legal protection, or more in-depth market research. To address inventor's information needs, WISC developed on electronic database with search capabilities by geographic region and by product category/industry. It targets both public and private resources capable of, and interested in, working with individual and small business inventors. At present, the project includes resources in Wisconsin only.

Not Available

1991-12-04T23:59:59.000Z

460

Wisconsin Inventors` Network Database final report  

SciTech Connect (OSTI)

The Wisconsin Innovation Service Center at UW-Whitewater received a DOE grant to create an Inventor`s Network Database to assist independent inventors and entrepreneurs with new product development. Since 1980, the Wisconsin Innovation Service Center (WISC) at the University of Wisconsin-Whitewater has assisted independent and small business inventors in estimating the marketability of their new product ideas and inventions. The purpose of the WISC as an economic development entity is to encourage inventors who appear to have commercially viable inventions, based on preliminary market research, to invest in the next stages of development, perhaps investigating prototype development, legal protection, or more in-depth market research. To address inventor`s information needs, WISC developed on electronic database with search capabilities by geographic region and by product category/industry. It targets both public and private resources capable of, and interested in, working with individual and small business inventors. At present, the project includes resources in Wisconsin only.

Not Available

1991-12-04T23:59:59.000Z

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Shielding Integral Benchmark Archive and Database (SINBAD)  

SciTech Connect (OSTI)

The Shielding Integral Benchmark Archive and Database (SINBAD) collection of benchmarks was initiated in the early 1990 s. SINBAD is an international collaboration between the Organization for Economic Cooperation and Development s Nuclear Energy Agency Data Bank (OECD/NEADB) and the Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL). SINBAD is a major attempt to compile experiments and corresponding computational models with the goal of preserving institutional knowledge and expertise that need to be handed down to future scientists. SINBAD is also a learning tool for university students and scientists who need to design experiments or gain expertise in modeling and simulation. The SINBAD database is currently divided into three categories fission, fusion, and accelerator benchmarks. Where possible, each experiment is described and analyzed using deterministic or probabilistic (Monte Carlo) radiation transport software.

Kirk, Bernadette Lugue [ORNL; Grove, Robert E [ORNL; Kodeli, I. [International Atomic Energy Agency (IAEA); Sartori, Enrico [ORNL; Gulliford, J. [OECD Nuclear Energy Agency

2011-01-01T23:59:59.000Z

462

Shielding integral benchmark archive and database (SINBAD)  

SciTech Connect (OSTI)

The shielding integral benchmark archive and database (SINBAD) collection of experiments descriptions was initiated in the early 1990s. SINBAD is an international collaboration between the Organization for Economic Cooperation and Development's Nuclear Energy Agency Data Bank (OECD/NEADB) and the Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL). SINBAD was designed to compile experiments and corresponding computational models with the goal of preserving institutional knowledge and expertise that need to be handed down to future scientists. SINBAD can serve as a learning tool for university students and scientists who need to design experiments or gain expertise in modeling and simulation. The SINBAD database is currently divided into three categories - fission, fusion, and accelerator experiments. Many experiments are described and analyzed using deterministic or stochastic (Monte Carlo) radiation transport software. The nuclear cross sections also play an important role as they are necessary in performing computational analysis. (authors)

Kirk, B.L.; Grove, R.E. [Radiation Safety Information Computational Center RSICC, Oak Ridge National Laboratory, P.O. Box 2008, Oak Ridge, TN 37831-6171 (United States); Kodeli, I. [Josef Stefan Inst., Jamova 39, 1000 Ljubljana (Slovenia); Gulliford, J.; Sartori, E. [OECD NEA Data Bank, Bd des Iles, 92130 Issy-les-Moulineaux (France)

2011-07-01T23:59:59.000Z

463

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

464

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

465

Sequence modelling and an extensible data model for genomic database  

SciTech Connect (OSTI)

The Human Genome Project (HGP) plans to sequence the human genome by the beginning of the next century. It will generate DNA sequences of more than 10 billion bases and complex marker sequences (maps) of more than 100 million markers. All of these information will be stored in database management systems (DBMSs). However, existing data models do not have the abstraction mechanism for modelling sequences and existing DBMS's do not have operations for complex sequences. This work addresses the problem of sequence modelling in the context of the HGP and the more general problem of an extensible object data model that can incorporate the sequence model as well as existing and future data constructs and operators. First, we proposed a general sequence model that is application and implementation independent. This model is used to capture the sequence information found in the HGP at the conceptual level. In addition, abstract and biological sequence operators are defined for manipulating the modelled sequences. Second, we combined many features of semantic and object oriented data models into an extensible framework, which we called the Extensible Object Model'', to address the need of a modelling framework for incorporating the sequence data model with other types of data constructs and operators. This framework is based on the conceptual separation between constructors and constraints. We then used this modelling framework to integrate the constructs for the conceptual sequence model. The Extensible Object Model is also defined with a graphical representation, which is useful as a tool for database designers. Finally, we defined a query language to support this model and implement the query processor to demonstrate the feasibility of the extensible framework and the usefulness of the conceptual sequence model.

Li, Peter Wei-Der (California Univ., San Francisco, CA (United States) Lawrence Berkeley Lab., CA (United States))

1992-01-01T23:59:59.000Z

466

Sequence modelling and an extensible data model for genomic database  

SciTech Connect (OSTI)

The Human Genome Project (HGP) plans to sequence the human genome by the beginning of the next century. It will generate DNA sequences of more than 10 billion bases and complex marker sequences (maps) of more than 100 million markers. All of these information will be stored in database management systems (DBMSs). However, existing data models do not have the abstraction mechanism for modelling sequences and existing DBMS`s do not have operations for complex sequences. This work addresses the problem of sequence modelling in the context of the HGP and the more general problem of an extensible object data model that can incorporate the sequence model as well as existing and future data constructs and operators. First, we proposed a general sequence model that is application and implementation independent. This model is used to capture the sequence information found in the HGP at the conceptual level. In addition, abstract and biological sequence operators are defined for manipulating the modelled sequences. Second, we combined many features of semantic and object oriented data models into an extensible framework, which we called the ``Extensible Object Model``, to address the need of a modelling framework for incorporating the sequence data model with other types of data constructs and operators. This framework is based on the conceptual separation between constructors and constraints. We then used this modelling framework to integrate the constructs for the conceptual sequence model. The Extensible Object Model is also defined with a graphical representation, which is useful as a tool for database designers. Finally, we defined a query language to support this model and implement the query processor to demonstrate the feasibility of the extensible framework and the usefulness of the conceptual sequence model.

Li, Peter Wei-Der [California Univ., San Francisco, CA (United States); [Lawrence Berkeley Lab., CA (United States)

1992-01-01T23:59:59.000Z

467

The Standard Energy Efficiency Database Platform  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SEED: The Standard Energy SEED: The Standard Energy Efficiency Database Platform Bill Prindle Bill Prindle ICF International William.prindle@icfi.com 202-492-9698 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Data invisibility is a fundamental barrier in building end-use markets. Measuring and recognizing efficiency in U.S. buildings requires standardizing our energy data infrastructure via software conventions. Impact of Project: SEED is intended to provide public

468

The Standard Energy Efficiency Database Platform  

Broader source: Energy.gov (indexed) [DOE]

SEED: The Standard Energy SEED: The Standard Energy Efficiency Database Platform Bill Prindle Bill Prindle ICF International William.prindle@icfi.com 202-492-9698 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Data invisibility is a fundamental barrier in building end-use markets. Measuring and recognizing efficiency in U.S. buildings requires standardizing our energy data infrastructure via software conventions. Impact of Project: SEED is intended to provide public

469

Gasification world database 2007. Current industry status  

SciTech Connect (OSTI)

Information on trends and drivers affecting the growth of the gasification industry is provided based on information in the USDOE NETL world gasification database (available on the www.netl.doe.gov website). Sectors cover syngas production in 2007, growth planned through 2010, recent industry changes, and beyond 2010 - strong growth anticipated in the United States. A list of gasification-based power plant projects, coal-to-liquid projects and coal-to-SNG projects under consideration in the USA is given.

NONE

2007-10-15T23:59:59.000Z

470

Preparing a public database of radio sources  

E-Print Network [OSTI]

We have collected the largest existing set of radio source lists in machine-readable form: 320 tables with 1.75 million records. Only a minor fraction of these is accessible via public databases. We describe our plans to make this huge amount of heterogeneous data accessible in a homogeneous way via the World Wide Web, with reliable cross-identifications, and searchable by various observables.

H. Andernach; S. A. Trushkin; A. G. Gubanov; O. V. Verkhodanov; V. B. Titov; A. Micol

1996-07-22T23:59:59.000Z

471

Accelerating semantic graph databases on commodity clusters  

SciTech Connect (OSTI)

We are developing a full software system for accelerating semantic graph databases on commodity cluster that scales to hundreds of nodes while maintaining constant query throughput. Our framework comprises a SPARQL to C++ compiler, a library of parallel graph methods and a custom multithreaded runtime layer, which provides a Partitioned Global Address Space (PGAS) programming model with fork/join parallelism and automatic load balancing over a commodity clusters. We present preliminary results for the compiler and for the runtime.

Morari, Alessandro; Castellana, Vito G.; Haglin, David J.; Feo, John T.; Weaver, Jesse R.; Tumeo, Antonino; Villa, Oreste

2013-10-06T23:59:59.000Z

472

Reliable and Adaptable Security Engineering for Database-Web Services  

E-Print Network [OSTI]

Reliable and Adaptable Security Engineering for Database-Web Services Martin Wimmer , Daniela,ehrnlech}@db.fmi.uni-passau.de Abstract. The situation in engineering security for Web services that access databases is as follows of sophisticated access control concepts for e-services. When engineering Web services that depend on databases

Kemper, Alfons

473

Handling Database Updates in Two-dimensional Temporal Logic  

E-Print Network [OSTI]

describing the history of the world, the database system can also execute temporal speci cations in the form a reference point or a reference time. If we apply these concepts to the description of databases, the history the history of the world (database), and action is to be executed upon the world in the present or future time

Finger, Marcelo

474

Analysing the Entire Wikipedia History with Database Supported Haskell  

E-Print Network [OSTI]

Analysing the Entire Wikipedia History with Database Supported Haskell George Giorgidze1 , Torsten the entire Wikipedia history. DSH is a novel high-level database query facility allowing for the for on our experience of using Database Supported Haskell (DSH) [4] for analysing the entire history

Grust, Torsten

475

Temporal Conditions and Integrity Constraints in Active Database Systems \\Lambda  

E-Print Network [OSTI]

database history. The evaluation algorithm is also an add­on component, executed on top of, and usingTemporal Conditions and Integrity Constraints in Active Database Systems \\Lambda A. Prasad Sistla, for specifying conditions and events in the rules for active database sys­ tem. This language permits

Wolfson, Ouri E.

476

Bridging Relational Database History and the Web: the XML Approach  

E-Print Network [OSTI]

Bridging Relational Database History and the Web: the XML Approach Fusheng Wang Integrated Data and queries, and make it easy to pub- lish database history to the Web. In this paper, we focus on the problem of preserving, publishing, and querying ef- ficiently the history of a relational database. Past research

Zaniolo, Carlo

477

Navigocorpus: A Database for Shipping Information A Methodological and  

E-Print Network [OSTI]

of Maritime History XXIII, 2 (2011) 241-262" #12;Jean-Pierre Dedieu, et al. the database on-line beginningNavigocorpus: A Database for Shipping Information ­ A Methodological and Technical Introduction and stored them in databases which are generally organized according to the nature of the sources used

Paris-Sud XI, Université de

478

Preserving and Querying Histories of XML-Published Relational Databases  

E-Print Network [OSTI]

Preserving and Querying Histories of XML-Published Relational Databases Fusheng Wang and Carlo the evolution history of such a view as yet another XML document, whereby the complete history of the database, and identify and select those which are best for representing and querying database histories. We show

Zaniolo, Carlo

479

Conference and Journal Publications in Database Systems and Theory  

E-Print Network [OSTI]

Conference and Journal Publications in Database Systems and Theory This document rates the conferences and journal publications in the database area with respect to quality and impact. As in many other systems and the database theory areas. A key issue we address is the relative importance of conference

Zhou, Yuanyuan

480

Facilitating Transformations in a Human Genome Project Database  

E-Print Network [OSTI]

Facilitating Transformations in a Human Genome Project Database S. B. Davidson, A. S. Kosky Dept: Susan B. Davidson, Phone (215) 898-3490, Fax (215) 898-0587 Abstract Human Genome Project databases common to laboratory notebook databases, within the Human Genome Project as well as within the broader

Pennsylvania, University of

Note: This page contains sample records for the topic "manager database authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Development of a Series of National Coalbed Methane Databases  

E-Print Network [OSTI]

Development of a Series of National Coalbed Methane Databases Mohaghegh, S. D., Nunsavathu, U Growing Interest in Coalbed Methane ­ Elevated natural gas prices ­ Demand for clean energy sources DatabaseDatabase One Location Reservoir & Sorption Collection ­ 126 Coalbed Areas ­ 34 Parameters Ordered

Mohaghegh, Shahab

482

Concept integration of document databases using different indexing languages  

Science Journals Connector (OSTI)

An integrated information retrieval system generally contains multiple databases that are inconsistent in terms of their content and indexing. This paper proposes a rough set-based transfer (RST) model for integration of the concepts of document databases ... Keywords: Compatibility, Concept integration, Document database, Indexing language, Rough set theory

Xueying Zhang

2006-01-01T23:59:59.000Z

483

User-Focused Data Management Alon Halevy  

E-Print Network [OSTI]

User-Focused Data Management Alon Halevy Google IUI 2009 Sanibel Island, Florida #12;Database on the world's water resources ­See circleofblue.org ·All the documentation about the Boeing 777 ·The Corie Curve Benefit Investment (time, cost) Dataspaces Data integration solutions ? #12;Reusing Human

Halevy, Alon

484

DISSERTATION ETH No. 12374 Spatial Raster Data Management  

E-Print Network [OSTI]

DISSERTATION ETH No. 12374 Spatial Raster Data Management for Geo-Information Systems A Database Concepts 9 2.1 Spatial Data Models and Raster Concepts 9 2.2 Spatial Raster Classes 11 23 Raster Data.5.1 Introduction 26 2.5.2 Significance in Raster Data Management 27 2.5.3 Metadata for Spatial Raster Data 28 2

Giger, Christine

485

Program Managers  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Managers Program Managers Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

486

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

487

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

488

Frequently Asked Questions About the Buildings Performance Database |  

Broader source: Energy.gov (indexed) [DOE]

Commercial Buildings » Buildings Performance Database » Commercial Buildings » Buildings Performance Database » Frequently Asked Questions About the Buildings Performance Database Frequently Asked Questions About the Buildings Performance Database On this page you will find answers to frequently asked questions pertaining to the DOE Buildings Performance Database (BPD). General What is the purpose of the BPD? What building energy performance data is included in the BPD? Access Information How can I access the database? How can I contribute data to the BPD? Database and Analysis Information What kinds of buildings does the BPD have? What are the data sources that populate the BPD? Does the BPD have time series data? How do you ensure that the data from these multiple sources is consistent and valid? What data format does the BPD utilize?

489

DOE Buildings Performance Database, sample Residential data | OpenEI  

Open Energy Info (EERE)

Buildings Performance Database, sample Residential data Buildings Performance Database, sample Residential data Dataset Summary Description This is a non-proprietary subset of DOE's Buildings Performance Database. Buildings from the cities of Dayton, OH and Gainesville, FL areas are provided as an example of the data in full database. Sample data here is formatted as CSV The Buildings Performance Database will have an API that allows access to the statistics about the data without exposing private information about individual buildings. The data available in this sample is limited due to the nature of the original datasets; the Buildings Performance database combines data from multiple sources to improve overall robustness. Data fields stored in the database can be seen in the BPD taxonomy: http://www1.eere.energy.gov/buildings/buildingsperformance/taxonomy.html

490

Open-access databases as unprecedented resources and drivers of cultural change in fisheries science  

SciTech Connect (OSTI)

Open-access databases with utility in fisheries science have grown exponentially in quantity and scope over the past decade, with profound impacts to our discipline. The management, distillation, and sharing of an exponentially growing stream of open-access data represents several fundamental challenges in fisheries science. Many of the currently available open-access resources may not be universally known among fisheries scientists. We therefore introduce many national- and global-scale open-access databases with applications in fisheries science and provide an example of how they can be harnessed to perform valuable analyses without additional field efforts. We also discuss how the development, maintenance, and utilization of open-access data are likely to pose technical, financial, and educational challenges to fisheries scientists. Such cultural implications that will coincide with the rapidly increasing availability of free data should compel the American Fisheries Society to actively address these problems now to help ease the forthcoming cultural transition.

McManamay, Ryan A [ORNL; Utz, Ryan [National Ecological Observatory Network

2014-01-01T23:59:59.000Z

491

Federal Emergency Management Information System (FEMIS) Data Management Guide Version 1.3  

SciTech Connect (OSTI)

FEMIS is an emergency management planning and analysis tool that is being developed under the direction of the US Army Chemical and Biological Defense Command. FEMIS is designed to help civilian emergency management personnel to plan for and support their responses to a chemical-releasing event at a military chemical stockpile. This guide provides the background as well as the operations and procedures needed to generate and maintain the data resources in the system. Database administrators, system administrators, and general users can use this guide to manage the datafiles and database. This document provides a description of the relational and spatial information present in FEMIS. It describes how the data was assembled, loaded, and managed while the system is in operation.

Burnett, R.A.; Downing, T.R.; Gaustad, K.L.; Hoza, M.; Johnson, S.M.; Loveall, R.M.; Millard, W.D.; Winters, C.; Wood, B.M.

1996-12-01T23:59:59.000Z

492

Energy Citations Database (ECD) - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code